# INTRODUCTION -government is about bridging government and citizen communications in more efficient, transparent and reliable ways through effective use of information technology. With the increasing use of Information technology, functions in government and businesses are now increasingly dependent on network of critical information infrastructure. As such, any disruption of the operation of information systems of critical infrastructure is likely to have a devastating effect on people, departmental records, economy, essential human & government services and national security. And also brings back to normality, it takes time. The Internet has become the main media for egovernment from delivering public information to electronic document and financial transactions although it is widely attributed to serious security weaknesses. As a result, security and privacy are the most crucial concerns of any e-government applications. In the view of the potential impact, protection of critical information infrastructure is essential to ensure that disruptions are infrequent, of minimal duration & manageable and cause the least damage possible. Users of information resources must have skills, knowledge, and training to manage information resources, enabling the organizations to effectively serve the customers/users through automated means. Personnel with program delivery responsibilities should recognize the importance of security of information resources and their management to mission performance. Ensuring security of e-government applications and infrastructures is crucial to maintain trust among in between departments to store, process and exchange information over the e-government systems. Due to dynamic and continuous threats on e-government information security, policy makers need to perform continuous evaluation on existing information security practices and controls. Based on the fact, this paper attempts to propose a holistic approach from managerial decision making perspective by combining all related aspects of security to create a framework used to evaluate e-government security strategy. # Figure : Input to Output Fuzzification process There are many factors which account for the increase in question but the most prominent among them is the rapidly growing use of soft computing and especially fuzzy logic in the conception and design of intelligent systems .As one of the principal constituents of soft computing, fuzzy logic is playing a key role in the conception and design of various systems. There are two concepts within fuzzy logic which play a central role in its applications. The first is that of a linguistic variable, i.e., a variable whose values are words or sentences in a natural or synthetic language. The other is that of a fuzzy ( D D D D ) G if-then rule in which the antecedent and consequent are propositions containing linguistic variables. The essential function served by linguistic variables is that of granulation of variables and their dependencies. In effect, the use of linguistic variables and fuzzy if-then rules results -through granulation in soft data compression which exploits the tolerance for imprecision and uncertainty. In this respect, fuzzy logic mimics the crucial ability of the human mind to summarize data and focus on decision-relevant information Since decision making mostly involve fuzzy logic techniques and alternative to consider altogether, this framework implement fuzzy logic techniques approach to view e-government security strategy from managerial perspective. Fuzzy set theory is applied to complement the framework in order to capture fuzziness in the form of inconsistencies and vagueness coming from subjective judgments by decision makers. # II. # METHODOLOGY Fuzzy Logic introduced by Zadeh (1965) gives us a language, with syntax and local semantics, in which we can translate our qualitative knowledge about the problem to be solved. Fuzzy logic is a powerful problem-solving methodology with a myriad of applications in embedded control and information processing. Fuzzy provides a remarkably simple way to draw definite conclusions from vague, ambiguous or imprecise information. In a sense, fuzzy logic resembles human decision making with its ability to work from approximate data and find precise solutions. # Straight line The simplest membership function is formed by straight line. We consider the speed of car fig (1.1), and plot the membership function for high. Where the horizontal represent the speed of the car and vertical axis represent the membership value for high. ii. # Trapezoidal If we consider the case 1.2 and plot the membership function for "less", we get a trapezoidal membership function. # Triangular This is formed by the combination of straight lines. The function is name as "trimf" .We considers the above case i.e. fuzzy set Z to represent the "number close to zero". So mathematically we can also represent it as The FIS editor handles the high level issuing for the system such as the number of input and output variables an their names, types of the 'AND' and 'OR' operators, and the aggregation and defuzzification methods. 0 if x<-1 ?z(x) = x + 1 if -1 ? x <0 (1.4) 1 -x if 0 ? x <1 0 if 1? x i. # The member ship function editor The membership function editor is used to define the properties of the membership function for the systems variables. ii. # The rule editor The rule editor enables the user to define and edit the of rules that describe the behavior of the system. iii. # The rule viewer The rule viewer is a read only tool that displays the whole fuzzy inference diagram. iv. # The surface viewer The surface viewer is also a read only tool. it is used to display how an output is dependent on any one or two of the inputs. In this topic researcher work is to develop a methodology fuzzy logic theory is used here, because this theory is more appropriate for this type of problem. Various factors for evaluate the performance will considered. We will consider most relevant some of the factors selected and will be fuzzified as input fuzzy variable "performance will be fuzzified with suitable fuzzy linguistic variable, and ultimately FIS will be developed. # RULE As per the input and output parameters fuzzified as shows rule base is generated by applying my own reasoning as an expert person to observe or taking decision to Evaluate the performance security strategy of a There are 34 numbers of rules generated using 'AND' and 'OR' operator. The overall rules are written below. The following table shows that how inference engine works for different input values .if we observe this table minimally then one can say that for different values of a input parameters the output (performance) that is produced by FIS more or less current. # VII. Comparision Table Comparative In the above table an example is demonstrated by and my point of view is taking arranging input values for getting the output as security performance in shape triangular and trapezoidal member ship we get the result same. # VIII. # Conculsion In this research paper we tried to developed the security strategy for E-Governance of the government by using fuzzy logic expert system because each and every government department need the absolutely flaw less performance of the security strategies, and using fuzzy technology evaluation of security strategies on the basis of various key performance attributes that have been validated. For obtaining the desired level of performance, we take input value for various attributes applied different membership functions and applied to the same linguistic variables, triangular and trapezoidal, more of less similar and compared the performance and we got the performance of absolute security parameters. The fuzzy scale has been designed to map and control the input data values from absolute truth to absolute false. The qualitative variables are mapped in to numeric results by implementing the fuzzy export system model through various input examples and provide a basis to evaluate government system security strategy. 12![shows a graphical representation, where the horizontal axis represent the force applied to the accelerator and the vertical shows membership value for "less". The function is often represented by "trapmf".iii. Gaussian Let say a fuzzy set Z which represent "number close to zero". The possible membership function for Z is ?z(x) =e exp(-x^2) (1.3) If we plot this function we get a graph shown in fig 1.3 and are refer as Gaussian membership function. iv.](image-2.png "Fig 1 . 2") ![By plotting equation 1.4 we get a triangular graph below figure called "triangular membership function" Year The above Figure : Membership functions with smooth transitions b) Fuzzy Set of Operations a) Fuzzy intersection b) Fuzzy union c) Fuzzy complement c) Fuzzy Rule Base A fuzzy rule-based model of human problem solving is described. The model is presented in its general form and then adapted to fit data from a simulated fault diagnosis task. The model was able to match 50% of human subjects' actions exactly while using the same rules approximately 70% of the time. Problem solving rules were selected by the model according to measures of recall, usefulness, applicability, and simplicity. Rules were further discriminated by their use of symptomatic information for pattern recognition or topographic information for information seeking. A production rule consists of two parts: condition (antecedent) part and conclusion (action, consequent) part, i.e: IF (conditions) THEN (actions) Rule 1: IF (C Score is high) and (C Ratio is good) and (C Credit is good) then (Decision is approve) Rule 2: IF (C Score is low) and (C Ratio is bad) or (C Credit is bad) then (Decision is disapprove) Volume XII Issue X Version I](image-3.png "") ![Fuzzification comprises the process of transforming crisp value into grade of membership for linguistic terms of fuzzy sets. The membership function is used to associate a grade to each linguistic term.](image-4.png "FUZZIRIFICATION") 1![Figure 1 : Developed With Four Input and One Output of FIS Triangular Figure-1 Describes the we select the five parameters and one output of the e-governance security strategy and apply to the FIS and arrange the rules then we evaluate the e-governance security strategy.](image-5.png "Figure 1 :") 2![Figure 2 : Fuzzification of Management Triangular Figure-2 Shows fuzzification of input parameters management with there membership function and its corresponding range as explain table1, the membership functions touching to each other.](image-6.png "Figure 2 :") 33![Figure 3 : Fuzzification of Security Strategy Triangular](image-7.png "Figure 3 :Figure- 3") 45![Figure 4 : Developing the Rules In the below explain some of the Rules 1, If (management is Equality Important) and (Technology is Slightly Important) then (Security Strategy is Alternative) 5, If (management is important) and (Technology is Slightly Important) and (Budget is Slightly Important then (Security Strategy is critical) 12, If (management is very important) and (Technology is Important) and (Budget is Slightly Important) and (Training is important) then (Security Strategy is sub-critical) 28, If (management is very important) and (Technology is Absolutely Important) and (Budget is Important) and (Training is Very Important) then (Security Strategy is goal)](image-8.png "Figure 4 :Figure 5 :Year") 6![Figure 6 : Three dimensional view of FIS INPUT/OUTPUT Security Strategy](image-9.png "Figure 6 :") 78![Figure 7 : Three Dimensional View of Fis Input/Output Security Strategy](image-10.png "Figure 7 :Figure 8 :") 91011![Figure 9 : Developed With Four Input and One Output of Fis Trapezoidal c) Output](image-11.png "Figure 9 :Figure 10 :Figure 11 :") 12![Figure 12 : Three dimensional view of FIS INPUT/OUTPUT Security Strategy](image-12.png "Figure 12 :") ![](image-13.png "") ![](image-14.png "") 2Fuzzy inference system editor201226Volume XII Issue X Version ID D D D ) G(Global Journal of Computer Science and Technology© 2012 Global Journals Inc. (US) Srl. No. MANAGEMENTTECHNOLOGYBUDGETTRANINGTRIANGULAR19.7812.51817.320.6215.816.917.319.838.7332.129.438.130.650464.168.170.669.470571.984.488.185.690.6 2 3D D D D ) G( © 2012 Global Journals Inc. (US) © 2012 Global Journals Inc. (US) Global Journal of Computer Science and Technology * LAZadeh Fuzzy Sets, Information and Control 1965 * Outline of A New Approach to the Analysis of of Complex Systems and Decision Processes LAZadeh 1973 * Fuzzy algorithms LAZadeh Info. & Ctl 12 1968 * Making computers think like people LAZadeh 1984 * Laws of thought SKorner Encyclopedia of Philosophy 4 1967 * Jan Lukasiewicz CLejewski Encyclopedia of Philosophy 5 1967 * Fuzzy logic and fuzzy reasoning JFBaldwin Fuzzy Reasoning and Its Applications EHMamdani BRGaines London Academic Press 1981 * Semantics of implication operators and fuzzy relational products WBandler LJKohout Fuzzy Reasoning and Its Applications EHMamdani BRGaines London Academic Press 1981 * The logic of fuzzy Bayesian influence," paper presented at the International Fuzzy Systems Association Symposium of Fuzzy information Processing MEschbach JCunnyngham Artificial Intelligence and Operational Research 1984 * A general approach to linguistic approximation FEsragh EHMamdani Fuzzy Reasoning and Its Applications EHMamdani BRGaines London Academic Press 1981 * Research on Risk Aversion of E-government Network Security XiaohongGan 2008 ieee research paper * E-government Security Management: Key Factors and Countermeasures Wang Jin-Fu 2009 ieee research paper * A New Fuzzy MCDM Framework to Evaluate IrfanSyamsuddin Junseok Hwang Bertucci 2010 * E-Government SecurityStrategy INFORMATION SYSTEMS SECURITY COMPLIANCE IN E-GOVERNMENT 2009 ieee research paper. 15 * MGoncalves Firewalls A Complete Guide New York McGraw Hill 1999