Social Engineering Attacks in E-Government System Detection and Prevention
Journal Title: INTERNATIONAL JOURNAL OF APPLIED ENGINEERING AND MANAGEMENT LETTERS (IJAEML) - Year 2022, Vol 6, Issue 1
Abstract
Purpose: E-Government system emerged as a novel public service provision platform that enables governance in an efficient and transparent manner globally. However, despite the success recorded so far by the increase in the use of information and communication technology (ICT) and E-government for public service provision. Social engineering attack (SEA) is one of the challenging information security attacks that prove to be difficult to tackle. This is because the attackers leverage on peoples’ weakness to exploit the system instead of technical vulnerabilities.Design/Methodology/Approach: This paper uses PESTLE (political, economic, social, technology, legal and environment) analysis to critically evaluate the external factors affecting SEAs in E-government system. Findings/Result: The study identified phishing, Baiting, Pretexting, Quid Pro Quo, Honey Trap, Tail Gating, and Pharming as the major SEA techniques used to exploit E-government systems. Furthermore, the author suggest training and awareness programme as the most effective way to detect as well as prevent SEA in E-government system. Users should be aware of the languages with terms requesting urgent response as well as unusual or unexpected situation in a suspicious messages or attachment as factors to detect SEA. Technical controls using natural language processes (NLP), securitypolicies, multifactor authentication (MFA) as well as secured preservation of confidential information from suspicious users are some of the SEA preventive measures.Originality/Value: Aflexible and efficient interaction among citizens, businesses and government organizations is a critical factor for successful E-Government system. SEA is one of major challenges affecting communications in E-government system that requires attention. In conclusion, studies toward technological approach for solution of SEAin E-government is recommended.Paper Type: Conceptual Research.
Authors and Affiliations
Musa Midila Ahmed
Factors Affecting Design Review A Case from Dang Valley, Nepal-Asia
Purpose:There seem some flaws during design by consultants because of time and cost constraints. To deal with this problem there is a need for a design review for those design parts to assess their complianc...
Perspectives, Challenges and Opportunities of E-Learning in Higher Education –A Brief Review
Purpose: In this developed world education plays an important role at all stages of an individual. From last one decade the education has been grown and advanced in the form of E-learnings process. The advan...
Novel SHP-ECC Mechanism Architecture for Attack Node Mitigation and toPredictFuture Community Intrusions
Purpose: Because of the apparent rapid advancement in the field of information and communication technology and its constant connection to the internet, customer and organizational data have become v...
Social Engineering Attacks in E-Government System Detection and Prevention
Purpose: E-Government system emerged as a novel public service provision platform that enables governance in an efficient and transparent manner globally. However, despite the success recorded so...
Application of Artificial Intelligence Technology in Tesla-A Case Study
Background/Purpose: Artificial intelligence algorithms are like humans, performing a task repeatedly, each time changing it slightly to maximize the result. A neural network is made up of several deep layers that allow f...