Social Engineering Attacks in E-Government System Detection and Prevention
Journal Title: INTERNATIONAL JOURNAL OF APPLIED ENGINEERING AND MANAGEMENT LETTERS (IJAEML) - Year 2022, Vol 6, Issue 1
Abstract
Purpose: E-Government system emerged as a novel public service provision platform that enables governance in an efficient and transparent manner globally. However, despite the success recorded so far by the increase in the use of information and communication technology (ICT) and E-government for public service provision. Social engineering attack (SEA) is one of the challenging information security attacks that prove to be difficult to tackle. This is because the attackers leverage on peoples’ weakness to exploit the system instead of technical vulnerabilities.Design/Methodology/Approach: This paper uses PESTLE (political, economic, social, technology, legal and environment) analysis to critically evaluate the external factors affecting SEAs in E-government system. Findings/Result: The study identified phishing, Baiting, Pretexting, Quid Pro Quo, Honey Trap, Tail Gating, and Pharming as the major SEA techniques used to exploit E-government systems. Furthermore, the author suggest training and awareness programme as the most effective way to detect as well as prevent SEA in E-government system. Users should be aware of the languages with terms requesting urgent response as well as unusual or unexpected situation in a suspicious messages or attachment as factors to detect SEA. Technical controls using natural language processes (NLP), securitypolicies, multifactor authentication (MFA) as well as secured preservation of confidential information from suspicious users are some of the SEA preventive measures.Originality/Value: Aflexible and efficient interaction among citizens, businesses and government organizations is a critical factor for successful E-Government system. SEA is one of major challenges affecting communications in E-government system that requires attention. In conclusion, studies toward technological approach for solution of SEAin E-government is recommended.Paper Type: Conceptual Research.
Authors and Affiliations
Musa Midila Ahmed
Investors Behavioural Intention of Cryptocurrency Adoption–A Review based Research Agenda
Purpose: The current study investigates the behavioral intention to use cryptocurrencies.The study's major goal is to prioritize the key motivations behind it mainlyInvestment incry...
Demonstration of Drawing by Robotic Arm using RoboDK and C#
Purpose:Robots are transforming the world, and soon they will take part or assist in our all-dailylife activities. There are several fields where robots are already doing well, like Surgery, painting, industrial automa...
Traffic Flow Prediction using Machine Learning Techniques -A Systematic Literature Review
Purpose: Traffic control in large cities is extremely tough. To alleviate costs associated with traffic congestion, some nations of the world have implemented Intelligent Transportation Systems (ITS). This pa...
A Review on Conceptual Model of Cyber Attack Detection and Mitigation Using Deep Ensemble Model
Purpose: When communication networks and the internet of things are integrated into business control systems, they become more vulnerable to cyber-attacks, which can have disastrous consequences. An...
Voice Biometric Systems for User Identification and Authentication –A Literature Review
Purpose:Biometric trends are used in many systems because of security aspects. The cryptosystem is such an example which uses a biometric. But due to stored biometric data for the authentication, this can be a...