SlideShare a Scribd company logo
1 of 23
AADHAAR
brand name of UIDAI




   KU COLLEGE OF ENGINEERING AND
            TECHNOLOGY


               TEAM:
             D.SAIPRIYA
             B.SNIGDHA
CONTENTS
What is AADHAAR??
Goals and missions of UIDAI
Projected benefits of AADHAAR
Practical risks involved in this
 project
SOLUTIONS to overcome these
 threats
CONCLUSION
What is AADHAAR??
Aadhaar is a 12-digit unique number which
  the Unique Identification Authority of
  India (UIDAI) will issue for all residents
  in India. The number will be stored in a
  centralized database and linked to the
  basic demographics and biometric
  information
UIDAI launched AADHAAR on 29 th
  September 2010.The first person to receive
  an AADHAAR was Rajana Sawane of
  Tembhli village.
Number schema of AADHAAR
 As shown in the picture above, the India Aadhaar
 number schema will actually have not even 12
 digits but only 11 digits. The 1st number will be
 the Implicit Version Number while the second, be
 the Check digit. So, that means that the Aadhaar
 number will only have 11 digits which really
 matter.
 The numbers in UID will be non repeating and
 non traceable or predictable and will be generated
Collection of
BIOMETRIC
information
Pictorial perspective:
UIDAI will provide AADHAAR
to residentsand missions of
Goals of India that                      UIDAI
       can be verified easily,
quickly and in cost effective way
           can eliminate duplicate
and fake identities




The UIDAI intends to cover all
residents of the country, but the
focus will be on enrolling the India's
Continued… .

The UIDAI will offer a strong form of
authentication where agencies can compare
demographic and biometric information of the
resident with record stored in central data base


This central data base is stored in a computer
which will be linked to all government and
private agencies like banks
Projected benefits
Aadhaar will become the single source of identity
verification. Residents would be spared the hassle
of repeatedly providing supporting identity
documents each time they wish to access services
such as obtaining a bank account, passport, driving
license and so on.

Financial inclusion with deeper penetration of
banks, insurance and easy distribution of benefits
of government schemes.
Continued….

 By providing a clear proof of identity,
  Aadhaar will also facilitate entry for
  poor and underprivileged residents into
  the formal banking system and the
  opportunity to avail services provided by
  the government and the private sector.

 Giving migrants mobility of identity.
UIDAI ECOSYSTEM
Practical risks of
 AADHAAR
  1. India has been facing various
   hacking problems from inside and
   abroad. Many times our government
   sites were also being hacked by
   hackers .This is very clear that our
   cyber security is not safe.
2. We are having a lot of corrupted
   people in India especially in
   government department. Everyone
   know that for money, maximum of
   government official leak any kind of
   information. Then what will be surely
Continued…
 3.It is proposed that UIN will
 be used as PAN for income tax
  purpose. If this happen than
 PAN will be available easily
 to any body and one may use
 other UIN or say PAN for any
 transaction. Today at least
 one can't find easily others
 PAN no.
 4.Village people will be
 offered Rs.100 for getting
 their Unique Identity Number.
 Every one know very well how
Proposed solutions
 Information classification:
 Information associated with the UID shall be
  classified in the minimum into two categories
  namely “Primary” and “Secondary”.
 Out of the “Primary” category a part would be
  considered “Public” information and other would be
  treated as “Private-Primary Information”
  Public information may consist of name, sex, age,
  registered address.
 Private-Primary information would be available to
  the data holder for query on a synchronized data
  server to ensure that the information is accurate at
  all times.
 Secondary Information would be kept in paper format in
multiple locations. One copy would also be kept in digital format
with strong encryption in an offline media with DRP support.
This would be available to authorized UID employees only for
grievance redressal and under appropriate audit trail recordings.

 Within UIDAI no employee would be provided access to all
aspects of the data base.

The elements of the data base would be broken into multiple
parts and scattered with an algorithm across the data base. They
would be assembled only by authorized employees.
Information storage security:
Information under storage is kept in encrypted.
Access shall be backed up by data integrity control, audit trail
monitoring and archival.

Information transmission security:
Transmission of Information into and out of the systems
would be monitored by a suitable Firewall and appropriate
polices and procedures shall be implemented to ensure that
viruses and other malicious codes are filtered.
Al l transmissions of data including confidential mails in
the name of UIDAI should be encrypted and digitally signed.
Logical access security:
Policies and Procedures shall be implemented for
ensuring that access to any IT device is made
available only with appropriate access authentication
such as Passwords.

Appropriate measures shall be initiated for
ensuring that a strong password policy is maintained
across the organization.

Use of hardware tokens with biometric and RFID
tags shall be used where considered necessary.
Employee consent:
 “ Agents” of UIDAI must be subjected to a
 very strict selection criteria including
 background checks, privacy declarations,
 indemnity etc should be obtained from every
 individual who is involved in this  activity.
 Any mistake observed and corrected will also
 be recorded as a “Security Breach” and the
 responsibility for the same would be fixed on
 the concerned person.
Employee awareness
Employee cyber usage
  policy:
• Employees would be subject to appropriate
  restrictions in use of Computers so that UID
  information is not subject to risk elements
  from Cyber space.
•  All access would be based on multi factor
  authentication of the employee and with
  archival of audit trail with a trusted third
  party with adequate security.
•  In particular, no computer which has access
  to secondary data will have access to Internet
Continued…
In particular, no storage media (such as cell
phones)would be allowed to be used by the
employees  in the ordinary course. All computers
would work on the network with dumb terminals.

 UIDAI shall retain all Policy documents related
 to information security for a period of a minimum
 of 3 years either in print or electronic form.    Data
 which is part of a security breach incident, is kept
 permanently.
CONCLUSION

“… Theconscious and intelligent
 manipulation of the organized habits
 and opinions of the masses is an
 important element in democratic
 society. Those who manipulate this
 unseen mechanism of society
 constitute an invisible government
 which is the true ruling power of our
THANK YOU
Print master
    QUERIES??
• Your Text here

• Lorem ipsum dolor sit amet, consectetuer
  adipiscing elit, sed diam nonummy nibh euismod
  tincidunt ut laoreet dolore magna aliquam erat
  volutpat. Ut wisi enim ad minim veniam, quis
  nostrud exerci tation ullamcorper suscipit lobortis
  nisl ut aliquip ex ea commodo consequat.

• Duis autem vel eum iriure dolor in hendrerit in
  vulputate velit esse molestie consequat, vel illum
  dolore eu feugiat nulla facilisis at vero eros et
  accumsan et iusto odio dignissim qui blandit
  praesent luptatum zzril delenit augue duis dolore
  te feugait nulla facilisi.

More Related Content

What's hot

Presentation of digital payments
Presentation of digital paymentsPresentation of digital payments
Presentation of digital paymentspro prosecl
 
Unique identification authority of india uid
Unique identification authority of india   uidUnique identification authority of india   uid
Unique identification authority of india uidAjit Dadresa
 
Is india ready for cashless economy
Is india ready for cashless economyIs india ready for cashless economy
Is india ready for cashless economyAishwarya Joshi
 
IRJET- Intelligent Automated Attendance System based on Facial Recognition
IRJET-  	  Intelligent Automated Attendance System based on Facial RecognitionIRJET-  	  Intelligent Automated Attendance System based on Facial Recognition
IRJET- Intelligent Automated Attendance System based on Facial RecognitionIRJET Journal
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College ProjectSheril Daniel
 
Overview of Mobile Payment Systems
Overview of Mobile Payment SystemsOverview of Mobile Payment Systems
Overview of Mobile Payment SystemsAmit Naik
 
IoT based attendance system
IoT based attendance systemIoT based attendance system
IoT based attendance systemIRJET Journal
 
Mobile banking project
Mobile banking projectMobile banking project
Mobile banking projectArfan Afzal
 
BUILDING DIGITAL INFRASTRUCTURE FOR A BILLION
BUILDING DIGITAL INFRASTRUCTURE FOR A BILLIONBUILDING DIGITAL INFRASTRUCTURE FOR A BILLION
BUILDING DIGITAL INFRASTRUCTURE FOR A BILLIONindiastack
 
RBI : Payment & Settlement Systems
RBI : Payment & Settlement SystemsRBI : Payment & Settlement Systems
RBI : Payment & Settlement SystemsRahul Deka
 
UIDAI:use of technology in increasing efficiency,delivery and transparency ppt
UIDAI:use of technology in increasing efficiency,delivery and transparency pptUIDAI:use of technology in increasing efficiency,delivery and transparency ppt
UIDAI:use of technology in increasing efficiency,delivery and transparency pptMOHD AQUIB
 
01 introduction-to-digital-finance
01 introduction-to-digital-finance01 introduction-to-digital-finance
01 introduction-to-digital-financeinnov-acts-ltd
 

What's hot (20)

Presentation of digital payments
Presentation of digital paymentsPresentation of digital payments
Presentation of digital payments
 
Digital payments
Digital paymentsDigital payments
Digital payments
 
Unique identification authority of india uid
Unique identification authority of india   uidUnique identification authority of india   uid
Unique identification authority of india uid
 
Mobile wallets
Mobile walletsMobile wallets
Mobile wallets
 
Digital Payments
Digital PaymentsDigital Payments
Digital Payments
 
Is india ready for cashless economy
Is india ready for cashless economyIs india ready for cashless economy
Is india ready for cashless economy
 
Cashless India
Cashless IndiaCashless India
Cashless India
 
Yono sbi report
Yono sbi reportYono sbi report
Yono sbi report
 
IRJET- Intelligent Automated Attendance System based on Facial Recognition
IRJET-  	  Intelligent Automated Attendance System based on Facial RecognitionIRJET-  	  Intelligent Automated Attendance System based on Facial Recognition
IRJET- Intelligent Automated Attendance System based on Facial Recognition
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College Project
 
Overview of Mobile Payment Systems
Overview of Mobile Payment SystemsOverview of Mobile Payment Systems
Overview of Mobile Payment Systems
 
IoT based attendance system
IoT based attendance systemIoT based attendance system
IoT based attendance system
 
Mobile banking project
Mobile banking projectMobile banking project
Mobile banking project
 
BUILDING DIGITAL INFRASTRUCTURE FOR A BILLION
BUILDING DIGITAL INFRASTRUCTURE FOR A BILLIONBUILDING DIGITAL INFRASTRUCTURE FOR A BILLION
BUILDING DIGITAL INFRASTRUCTURE FOR A BILLION
 
RBI : Payment & Settlement Systems
RBI : Payment & Settlement SystemsRBI : Payment & Settlement Systems
RBI : Payment & Settlement Systems
 
Banking basics
Banking basicsBanking basics
Banking basics
 
UIDAI:use of technology in increasing efficiency,delivery and transparency ppt
UIDAI:use of technology in increasing efficiency,delivery and transparency pptUIDAI:use of technology in increasing efficiency,delivery and transparency ppt
UIDAI:use of technology in increasing efficiency,delivery and transparency ppt
 
debit cards
debit cardsdebit cards
debit cards
 
01 introduction-to-digital-finance
01 introduction-to-digital-finance01 introduction-to-digital-finance
01 introduction-to-digital-finance
 
Artificial Intelligence in Banking
Artificial Intelligence in BankingArtificial Intelligence in Banking
Artificial Intelligence in Banking
 

Viewers also liked

Building tiered data stores using aesop to bridge sql and no sql systems
Building tiered data stores using aesop to bridge sql and no sql systemsBuilding tiered data stores using aesop to bridge sql and no sql systems
Building tiered data stores using aesop to bridge sql and no sql systemsRegunath B
 
Aadhaar at 5th_elephant_v3
Aadhaar at 5th_elephant_v3Aadhaar at 5th_elephant_v3
Aadhaar at 5th_elephant_v3Regunath B
 
E commerce data migration in moving systems across data centres
E commerce data migration in moving systems across data centres E commerce data migration in moving systems across data centres
E commerce data migration in moving systems across data centres Regunath B
 
Facebook style notifications using hbase and event streams
Facebook style notifications using hbase and event streamsFacebook style notifications using hbase and event streams
Facebook style notifications using hbase and event streamsRegunath B
 
Aesop change data propagation
Aesop change data propagationAesop change data propagation
Aesop change data propagationRegunath B
 
Building the Flipkart phantom
Building the Flipkart phantomBuilding the Flipkart phantom
Building the Flipkart phantomRegunath B
 
Hadoop at aadhaar
Hadoop at aadhaarHadoop at aadhaar
Hadoop at aadhaarRegunath B
 
Oss as a competitive advantage
Oss as a competitive advantageOss as a competitive advantage
Oss as a competitive advantageRegunath B
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Ali Raw
 

Viewers also liked (13)

Building tiered data stores using aesop to bridge sql and no sql systems
Building tiered data stores using aesop to bridge sql and no sql systemsBuilding tiered data stores using aesop to bridge sql and no sql systems
Building tiered data stores using aesop to bridge sql and no sql systems
 
Aadhaar at 5th_elephant_v3
Aadhaar at 5th_elephant_v3Aadhaar at 5th_elephant_v3
Aadhaar at 5th_elephant_v3
 
What database
What databaseWhat database
What database
 
E commerce data migration in moving systems across data centres
E commerce data migration in moving systems across data centres E commerce data migration in moving systems across data centres
E commerce data migration in moving systems across data centres
 
Facebook style notifications using hbase and event streams
Facebook style notifications using hbase and event streamsFacebook style notifications using hbase and event streams
Facebook style notifications using hbase and event streams
 
Srikanth Nadhamuni
Srikanth NadhamuniSrikanth Nadhamuni
Srikanth Nadhamuni
 
Aadhaar
AadhaarAadhaar
Aadhaar
 
Uid
UidUid
Uid
 
Aesop change data propagation
Aesop change data propagationAesop change data propagation
Aesop change data propagation
 
Building the Flipkart phantom
Building the Flipkart phantomBuilding the Flipkart phantom
Building the Flipkart phantom
 
Hadoop at aadhaar
Hadoop at aadhaarHadoop at aadhaar
Hadoop at aadhaar
 
Oss as a competitive advantage
Oss as a competitive advantageOss as a competitive advantage
Oss as a competitive advantage
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 

Similar to practical risks in aadhaar project and measures to overcome them

Future of Aadhaar is "a secure and robust system ensuring complete security a...
Future of Aadhaar is "a secure and robust system ensuring complete security a...Future of Aadhaar is "a secure and robust system ensuring complete security a...
Future of Aadhaar is "a secure and robust system ensuring complete security a...National Management Olympiad
 
Aadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millionsAadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millionsHp kushal
 
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...Unlocking the Power of Identity Verification in India A Step Towards a Safer ...
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...rpacpc
 
Big data and UID
Big data and UIDBig data and UID
Big data and UIDshalin2005
 
Role of Biometrics in IoT - Bahaa Abdul Hadi.pdf
Role of Biometrics in IoT - Bahaa Abdul Hadi.pdfRole of Biometrics in IoT - Bahaa Abdul Hadi.pdf
Role of Biometrics in IoT - Bahaa Abdul Hadi.pdfBahaa Abdulhadi
 
Aadhaar Project A Critical Analysis
Aadhaar Project  A Critical AnalysisAadhaar Project  A Critical Analysis
Aadhaar Project A Critical AnalysisSandra Valenzuela
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268xosap
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In IndiaIRJET Journal
 
Unique Identification Number database simulation project report
Unique Identification Number database simulation project reportUnique Identification Number database simulation project report
Unique Identification Number database simulation project reportRachit Mishra
 
Digital India Initiative
Digital India Initiative Digital India Initiative
Digital India Initiative sadique_ghitm
 
Unique ID Authority of India, Design and Cloud Connection
Unique ID Authority of India, Design and Cloud ConnectionUnique ID Authority of India, Design and Cloud Connection
Unique ID Authority of India, Design and Cloud ConnectionSuhas Kelkar
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIAchandu namani
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)ProductNation/iSPIRT
 
Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBahaa Abdulhadi
 
IoT and security
IoT and securityIoT and security
IoT and securityIET India
 

Similar to practical risks in aadhaar project and measures to overcome them (20)

Future of Aadhaar is "a secure and robust system ensuring complete security a...
Future of Aadhaar is "a secure and robust system ensuring complete security a...Future of Aadhaar is "a secure and robust system ensuring complete security a...
Future of Aadhaar is "a secure and robust system ensuring complete security a...
 
Aadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millionsAadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millions
 
Aadhaar- National Identity proof
Aadhaar- National Identity proofAadhaar- National Identity proof
Aadhaar- National Identity proof
 
GHC-2014-Lavanya
GHC-2014-LavanyaGHC-2014-Lavanya
GHC-2014-Lavanya
 
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...Unlocking the Power of Identity Verification in India A Step Towards a Safer ...
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...
 
Aadhaar
AadhaarAadhaar
Aadhaar
 
Big data and UID
Big data and UIDBig data and UID
Big data and UID
 
Role of Biometrics in IoT - Bahaa Abdul Hadi.pdf
Role of Biometrics in IoT - Bahaa Abdul Hadi.pdfRole of Biometrics in IoT - Bahaa Abdul Hadi.pdf
Role of Biometrics in IoT - Bahaa Abdul Hadi.pdf
 
Aadhaar Project A Critical Analysis
Aadhaar Project  A Critical AnalysisAadhaar Project  A Critical Analysis
Aadhaar Project A Critical Analysis
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
Unique Identification Number database simulation project report
Unique Identification Number database simulation project reportUnique Identification Number database simulation project report
Unique Identification Number database simulation project report
 
Digital India Initiative
Digital India Initiative Digital India Initiative
Digital India Initiative
 
Unique ID Authority of India, Design and Cloud Connection
Unique ID Authority of India, Design and Cloud ConnectionUnique ID Authority of India, Design and Cloud Connection
Unique ID Authority of India, Design and Cloud Connection
 
uid
uiduid
uid
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
 
Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of Things
 
IoT and security
IoT and securityIoT and security
IoT and security
 

Recently uploaded

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Recently uploaded (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

practical risks in aadhaar project and measures to overcome them

  • 1. AADHAAR brand name of UIDAI KU COLLEGE OF ENGINEERING AND TECHNOLOGY TEAM: D.SAIPRIYA B.SNIGDHA
  • 2. CONTENTS What is AADHAAR?? Goals and missions of UIDAI Projected benefits of AADHAAR Practical risks involved in this project SOLUTIONS to overcome these threats CONCLUSION
  • 3. What is AADHAAR?? Aadhaar is a 12-digit unique number which the Unique Identification Authority of India (UIDAI) will issue for all residents in India. The number will be stored in a centralized database and linked to the basic demographics and biometric information UIDAI launched AADHAAR on 29 th September 2010.The first person to receive an AADHAAR was Rajana Sawane of Tembhli village.
  • 4. Number schema of AADHAAR  As shown in the picture above, the India Aadhaar number schema will actually have not even 12 digits but only 11 digits. The 1st number will be the Implicit Version Number while the second, be the Check digit. So, that means that the Aadhaar number will only have 11 digits which really matter.  The numbers in UID will be non repeating and non traceable or predictable and will be generated
  • 7. UIDAI will provide AADHAAR to residentsand missions of Goals of India that UIDAI  can be verified easily, quickly and in cost effective way  can eliminate duplicate and fake identities The UIDAI intends to cover all residents of the country, but the focus will be on enrolling the India's
  • 8. Continued… . The UIDAI will offer a strong form of authentication where agencies can compare demographic and biometric information of the resident with record stored in central data base This central data base is stored in a computer which will be linked to all government and private agencies like banks
  • 9. Projected benefits Aadhaar will become the single source of identity verification. Residents would be spared the hassle of repeatedly providing supporting identity documents each time they wish to access services such as obtaining a bank account, passport, driving license and so on. Financial inclusion with deeper penetration of banks, insurance and easy distribution of benefits of government schemes.
  • 10. Continued….  By providing a clear proof of identity, Aadhaar will also facilitate entry for poor and underprivileged residents into the formal banking system and the opportunity to avail services provided by the government and the private sector.  Giving migrants mobility of identity.
  • 12. Practical risks of AADHAAR 1. India has been facing various hacking problems from inside and abroad. Many times our government sites were also being hacked by hackers .This is very clear that our cyber security is not safe. 2. We are having a lot of corrupted people in India especially in government department. Everyone know that for money, maximum of government official leak any kind of information. Then what will be surely
  • 13. Continued… 3.It is proposed that UIN will be used as PAN for income tax purpose. If this happen than PAN will be available easily to any body and one may use other UIN or say PAN for any transaction. Today at least one can't find easily others PAN no. 4.Village people will be offered Rs.100 for getting their Unique Identity Number. Every one know very well how
  • 14. Proposed solutions  Information classification:  Information associated with the UID shall be classified in the minimum into two categories namely “Primary” and “Secondary”.  Out of the “Primary” category a part would be considered “Public” information and other would be treated as “Private-Primary Information”   Public information may consist of name, sex, age, registered address.  Private-Primary information would be available to the data holder for query on a synchronized data server to ensure that the information is accurate at all times.
  • 15.  Secondary Information would be kept in paper format in multiple locations. One copy would also be kept in digital format with strong encryption in an offline media with DRP support. This would be available to authorized UID employees only for grievance redressal and under appropriate audit trail recordings.  Within UIDAI no employee would be provided access to all aspects of the data base. The elements of the data base would be broken into multiple parts and scattered with an algorithm across the data base. They would be assembled only by authorized employees.
  • 16. Information storage security: Information under storage is kept in encrypted. Access shall be backed up by data integrity control, audit trail monitoring and archival. Information transmission security: Transmission of Information into and out of the systems would be monitored by a suitable Firewall and appropriate polices and procedures shall be implemented to ensure that viruses and other malicious codes are filtered. Al l transmissions of data including confidential mails in the name of UIDAI should be encrypted and digitally signed.
  • 17. Logical access security: Policies and Procedures shall be implemented for ensuring that access to any IT device is made available only with appropriate access authentication such as Passwords. Appropriate measures shall be initiated for ensuring that a strong password policy is maintained across the organization. Use of hardware tokens with biometric and RFID tags shall be used where considered necessary.
  • 18. Employee consent:  “ Agents” of UIDAI must be subjected to a very strict selection criteria including background checks, privacy declarations, indemnity etc should be obtained from every individual who is involved in this  activity.  Any mistake observed and corrected will also be recorded as a “Security Breach” and the responsibility for the same would be fixed on the concerned person. Employee awareness
  • 19. Employee cyber usage policy: • Employees would be subject to appropriate restrictions in use of Computers so that UID information is not subject to risk elements from Cyber space. •  All access would be based on multi factor authentication of the employee and with archival of audit trail with a trusted third party with adequate security. •  In particular, no computer which has access to secondary data will have access to Internet
  • 20. Continued… In particular, no storage media (such as cell phones)would be allowed to be used by the employees  in the ordinary course. All computers would work on the network with dumb terminals. UIDAI shall retain all Policy documents related to information security for a period of a minimum of 3 years either in print or electronic form.    Data which is part of a security breach incident, is kept permanently.
  • 21. CONCLUSION “… Theconscious and intelligent manipulation of the organized habits and opinions of the masses is an important element in democratic society. Those who manipulate this unseen mechanism of society constitute an invisible government which is the true ruling power of our
  • 23. Print master QUERIES?? • Your Text here • Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat. Ut wisi enim ad minim veniam, quis nostrud exerci tation ullamcorper suscipit lobortis nisl ut aliquip ex ea commodo consequat. • Duis autem vel eum iriure dolor in hendrerit in vulputate velit esse molestie consequat, vel illum dolore eu feugiat nulla facilisis at vero eros et accumsan et iusto odio dignissim qui blandit praesent luptatum zzril delenit augue duis dolore te feugait nulla facilisi.