What Is E-Administration?

E-government refers to a brand-new management mode in which government agencies use modern information technology, network technology, and office automation technology to perform office work, management, and provide public services to society. The scope of e-government in a broad sense should include all state agencies; e-government in a narrow sense mainly includes administrative organs at all levels that are directly responsible for the management of national public and social affairs. [1]

E-government

(Government operation model)

Since the emergence of e-government in the 1990s, there are many definitions of Electronic Government, and it has been continuously updated with the development of practice.
CPPCC National Committee,
G2G: Intergovernmental e-government
G2B: Government-Commercial E-Government
G2C: Government-Citizen E-Government
G2E: Government-Employee E-Government
1. The government obtains information from the Internet and promotes the informatization of the network
2. Strengthen government information services, set up the government's own website and homepage on the Internet, provide possible information services to the public, and make government affairs public
3 Establish an online service system to enable government affairs to interact with the public online, that is, "e-government affairs"
4 The use of electronic commerce for government means "electronic government procurement".
5. Make full use of the government affairs network to realize the government's "paperless office".
6. Government knowledge base.
Compared with traditional administrative methods, the biggest feature of e-government is the electronicization of its administrative methods,
E-government is the procedures, systems, processes and interfaces for government departments / institutions to use modern information technology and network technology to achieve efficient, transparent, and standardized electronic internal office, collaborative office and external service. Compared with the traditional government's public services, e-government has the characteristics of public goods, such as extensiveness, openness, non-exclusiveness, and other features such as directness, convenience, low cost, and better equality .
China's National E-government Framework
1.Service and application system
(1) Service system
(2) Priority support business
(3) Application system
2. Information resources
(1) Information collection and update resources
(2) Information disclosure and shared resources
(3) Basic information resources
3. Infrastructure
(1) National e-government network
(2) Government information resource catalog system and exchange system
(3) Information security infrastructure
4. Laws and regulations and standardization system
5. Management system
In order to standardize the construction of the security and confidentiality system of the e-government intranet backbone network and access networks, and to ensure the safe and reliable operation of the e-government intranet, the provinces and regions have issued the "Recommended Catalog of E-government Intranet Security and Confidential Products" (hereinafter referred to as "Catalogue"), put forward reference opinions on the procurement of related equipment, and facilitate the effective development of e-government and equipment procurement in various places. In order to carry out this basic work effectively, we must pay attention to it from various aspects, and at the same time, we must strengthen constraints and coordination in terms of systems and measures, and explore effective ways and methods.
Contents and Features of E-government Intranet Security
According to the requirements of the E-government intranet security product recommendation catalog, the products related to network security mainly include firewalls, intrusion detection systems, security audit systems, vulnerability scanning systems, security isolation and information exchange systems, and physical isolation cards. The purpose of using a firewall is to establish a security control point between different networks or between different network segments of the same network. By allowing, denying, or redirecting the passing data flow, etc., the network can be implemented on different networks or between different network segments. Communications and access are audited and controlled. The intrusion detection system is the discovery of intrusion behaviors. It collects information and analyzes several key points in the computer network or computer to find out whether there are any violations of security policies and signs of being attacked in the network system. The security audit system can record user activities in the network in detail, including access time, addresses, data, programs, equipment, etc., as well as information such as system errors and configuration modifications. The function implemented by the vulnerability scanning system is to perform relevant security checks on the network system, find its vulnerabilities and vulnerabilities, evaluate the security status of the system, analyze the risks, and propose solutions and suggestions for the problems found, thereby improving the overall security of the network system Sex. On the basis of guaranteeing the termination of the network protocol between the internal and external networks, the security isolation and information exchange system can realize the secure exchange of information between the networks. It can only be used between (1) different secret networks; (2) the same secret network Between different security domains; (3) between a network physically isolated from the Internet and a secret-level network; (4) between a network that is not connected to a secret network and the Internet. The physical isolation card realizes physical isolation when a computer is used as two or more network terminals of different properties.
Correct understanding of recommended products and government procurement
Through the analysis above, we can see that e-government security requirements are relatively high and performance characteristics are obvious. Therefore, it is necessary to have an authority to evaluate and evaluate such confidential products, and to specify the work for the majority of users and purchasing agents. direction. During the implementation of the recommended directory, there are some key issues that must be clarified to facilitate the orderly development of network security work.
The first is to implement specific subjective departments. E-government is an effective way for government agencies to improve work efficiency. Intranet construction is the key to government e-government. Government information centers at all levels are not only responsible for specific business work, but also responsible for the management of intranet security. The e-government construction leading group formulates relevant documents, mainly including the general principles of internal network construction, implementation methods, specific requirements, security control, related equipment procurement and management methods, etc., especially for the construction of access network security and confidentiality systems. Certain efforts should be made to coordinate the working mechanism with the financial department and centralized procurement agencies, stipulating that all product procurement related to e-government should be pre-reviewed by the e-government leading group when applying for plans, mainly to implement the recommended catalogue requirements to prevent the purchase of products There are serious defects, outdated and aging, lack of compatibility, etc., thereby ensuring the safe and effective operation of the main network.
The second is to find the best combination of the selected catalog products and the programmatic implementation of government procurement. The confidential product catalog is a comprehensive evaluation of network equipment reliability, functionality, security and confidentiality indicators authorized by authorities at the provincial level or above. Among them, security is very important. This requires that in accordance with the principle of procurement of related equipment, The catalogue is enforced, however, the procedures for government procurement require that no supplier be designated and that the supplier's right to participate freely must not be excluded. Since the bidding information is to be released publicly, there must be companies and suppliers not in the catalogue who are willing to participate in bidding competitions when they are informed of the information. In these cases, there are several ways to deal with it: 1. Inviting bidding or competitive negotiation At this time, you can invite suppliers in the directory to participate in the bidding, and the procurement information is published within a certain range. This may cause some controversy, but the authority of certification can now exert a strong policy advantage. 2. Publicly release bidding information. Suppliers both inside and outside the catalogue have the opportunity to participate in bidding. In the design of the scoring method, full consideration is given to the weight of intranet security and confidentiality. At the same time, the overall score is set strictly in accordance with the technical performance, standard parameters, and reliability of the recommended product Method. Once the equipment provided by enterprises and suppliers outside the directory has advantages in security and performance, and the price is reasonable, and it meets the needs of confidentiality, there is still a possibility of winning the bid. Of course, such enterprises should be adjusted into the scope of the directory in time.
The third is to clarify the validity period of the catalog product certificate, timely review and supplement, and do a good job of related connection. The manufacturer's brand in the catalog has a valid certificate time, which will be invalidated if it expires, that is, once the government purchases the brand in the catalog, it must be within the validity period of the product certificate. The products in the catalog must be dynamically managed. The product's popularity, reliability, and technical indicators must be measured by an objective standard. The testing and appraisal agency must handle the evaluation affairs with public heart, because although it involves confidential products, the company is selected or not. It directly affects the sales in the future and is closely integrated with economic benefits, which is vital to the development of the enterprise.
Fourth, the confidentiality of the directory. Since it is a confidential product recommendation catalog, it seems that the scope of publication of the catalog is not appropriate to be too wide or too wide. Generally, it is published jointly with the e-government leading group and the Security Bureau.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?