observer
 ONLINE


OTHER PUBLICATIONS


OTHER LINKS

Marriage Proposals
Classified
Government Gazette

Poorly managed computer systems a risk in Govt institutions
 

Organisations can improve their efficiency by using computer technology. Government institutions handling especially a large volume of data can use technology effectively to make things easy for people. However, bureaucracy, inefficiency and corruption coupled with lack of IT skilled top officials make things worse and the institutions lose valuable data within a few seconds creating serious issues in government service.


Pic by Chinthaka Kumarasinghe

The Department of Motor Traffic (DMT) faced a similar crisis recently and the computer system in the department was paralysed for nearly one week bringing all work in the department to a standstill. Fortunately the data in the database had not been deleted as reported by some media, sources said.

After the crisis officers accused one another in the media and this demonstrated the lack of coordination and bureaucracy that prevailed in the department. According to media reports the IT personnel in the department attempted to blame the Commissioner and the Assistant Commissioner (IT) for it. The Sunday Observer learns that this was a result of many issues by various officials including IT personnel.

The DMT case is an example how poorly the government institutions use computer technology and the associated risk therein. The DMT is one of the main institutions that brings a large amount of revenue to the government and its data base is very important in many aspects including national security.

After the computer system failed, the DMT called for assistance from the Sri Lanka Computer Emergency Response Team (SLCERT) of the ICTA. The SLCERT report said that the DMT was very fortunate to survive a major catastrophe, due to the early detection of the problem.

The report highlighted key issues in the DMT computer system. The report said that the system doesn't have a firewall system or up-to-date anti virus protection between the client and the server. The anti virus application was last updated in December 2004. There are no policies with regard to information security such as password policy, shared access policy, backup policy and disaster recovery policy in the system.

The client machines can access the shared folders in the application server without any authentication. The report also highlighted the bureaucracy in the administration and said that there is a distinct lack of cooperation between the IT team and the management, making coordination of recovery activities difficult. There is resistance to change within the team, which impedes the introduction of a solution, the report said.

The report said that the viability of Windows NT use in the system needs to be re-examined by the DMT. Windows NT is an outdated platform and it has limited security features. Currently the vendor Microsoft does not support the Windows NT platform, it said.

The SLCERT team detected that the victim machine was infected by a Worm (CME-24). It attacks security applications and attempts to disable antivirus applications. CME-24 activates and overwrites files with the extensions on the third of every month at a time scheduled via a command.

Since the worm contains a backdoor to the infected system it may not be removed by an antivirus application or a removal tool. It spreads through file sharing over the network. It utilises aliases to confuse victims about its identity. It writes system registry keys so that any deleted files will be reactivated when the system is restarted, the report said.

Though the IT personnel of the department said that the virus infection came from the internet, the report said that the network is isolated and has no internet or email connection. The possible infection media could be USB drive, floppy disk or a CD.

The SLCERT has made the following recommendations to be implemented immediately.

* Remove all machines from the network, including the server. Install and run up-to-date antivirus software on the server and clients before connecting them to the network. Since the worm has built-in backdoors and other components that will not be detected by antivirus applications and highly recommended total system backup of the application server is necessary.

* Long and medium term recommendations of the SLCERT are important for all government institutions handling a similar network. It recommends to replace the Windows NT server with a current server platform such as Windows 2003 server. The report also recommends the installation of firewall and limits access between the clients and the server.

It also recommends obtaining genuine, licensed versions of Microsoft Windows for client machines and to formulate and enforce regular update policy. It is learnt that all machines used by DMT are assembled machines with no brand and the software running on them are copies.

* For virus protection, it recommended to formulate a software update policy and keep virus definition files up to date.

The DMT is a key government agency and if it maintains the computer system in this manner we wonder how other institutions fare.

The government is planning e-governance that computerises all departments and connects them to one network. The DMT case shows how poorly these already computerised institutions maintain their systems.

The DMT lapse also stresses the need for close monitoring by independent government institutions such as the ICTA.

[email protected]
 

EMAIL |   PRINTABLE VIEW | FEEDBACK

Gamin Gamata - Presidential Community & Welfare Service
Sri Lanka
www.srilankans.com
www.peaceinsrilanka.org
www.army.lk
www.news.lk
www.defence.lk
www.helpheroes.lk/
 

| News | Editorial | Financial | Features | Political | Security | Spectrum | Impact | Sports | World | Magazine | Junior | Letters | Obituaries |

 
 

Produced by Lake House Copyright � 2006 The Associated Newspapers of Ceylon Ltd.

Comments and suggestions to : Web Editor