Social Engineering Attacks in E-Government System Detection and Prevention
Journal Title: INTERNATIONAL JOURNAL OF APPLIED ENGINEERING AND MANAGEMENT LETTERS (IJAEML) - Year 2022, Vol 6, Issue 1
Abstract
Purpose: E-Government system emerged as a novel public service provision platform that enables governance in an efficient and transparent manner globally. However, despite the success recorded so far by the increase in the use of information and communication technology (ICT) and E-government for public service provision. Social engineering attack (SEA) is one of the challenging information security attacks that prove to be difficult to tackle. This is because the attackers leverage on peoples’ weakness to exploit the system instead of technical vulnerabilities.Design/Methodology/Approach: This paper uses PESTLE (political, economic, social, technology, legal and environment) analysis to critically evaluate the external factors affecting SEAs in E-government system. Findings/Result: The study identified phishing, Baiting, Pretexting, Quid Pro Quo, Honey Trap, Tail Gating, and Pharming as the major SEA techniques used to exploit E-government systems. Furthermore, the author suggest training and awareness programme as the most effective way to detect as well as prevent SEA in E-government system. Users should be aware of the languages with terms requesting urgent response as well as unusual or unexpected situation in a suspicious messages or attachment as factors to detect SEA. Technical controls using natural language processes (NLP), securitypolicies, multifactor authentication (MFA) as well as secured preservation of confidential information from suspicious users are some of the SEA preventive measures.Originality/Value: Aflexible and efficient interaction among citizens, businesses and government organizations is a critical factor for successful E-Government system. SEA is one of major challenges affecting communications in E-government system that requires attention. In conclusion, studies toward technological approach for solution of SEAin E-government is recommended.Paper Type: Conceptual Research.
Authors and Affiliations
Musa Midila Ahmed
Performance Analysis of Mobile Ad Hoc Routing Protocols in Vehicular Ad Hoc Networks using NS3
Vehicular Ad hoc Networks (VANET) is an emerging technology that brings tremendous technological advancement in the method of communication among smart vehicles. Due to its complex infrastructure and vehicle speed, dat...
Demonstration of Modbus Protocol for Robot Communication Using C#
Purpose:The Modbus is the trusted name in the industrial automation communication domain. It is a pretty simple protocol to implement and so very popular to the industrial communication personnel. Nowadays, someindustri...
Use of Natural Language Processing in Software Requirements Prioritization–A Systematic Literature Review
Purpose: Research involves the creation and implementation of new ideas by keeping the existing work as a foundation. The literature review done in this paper is to familiarise and to know about the domain o...
Voice Biometric Systems for User Identification and Authentication –A Literature Review
Purpose:Biometric trends are used in many systems because of security aspects. The cryptosystem is such an example which uses a biometric. But due to stored biometric data for the authentication, this can be a...
Smart City Waste Management through ICT and IoT driven Solution
Purpose: The growing population and mass relocation of citizens from urban and semi-urban areas to Smart Cities have resulted in exponential growth in Smart Cities and thereby certain challenges. One of the major chall...