Social Engineering Attacks in E-Government System: Detection and Prevention

Author:

Ahmed Musa Midila1

Affiliation:

1. Faculty of Education, Department of Physical Science Education, Modibbo Adama University, Yola, Nigeria

Abstract

Purpose: E-Government system emerged as a novel public service provision platform that enables governance in an efficient and transparent manner globally. However, despite the success recorded so far by the increase in the use of information and communication technology (ICT) and E-government for public service provision. Social engineering attack (SEA) is one of the challenging information security attacks that prove to be difficult to tackle. This is because the attackers leverage on peoples’ weakness to exploit the system instead of technical vulnerabilities. Design/Methodology/Approach: This paper uses PESTLE (political, economic, social, technology, legal and environment) analysis to critically evaluate the external factors affecting SEAs in E-government system. Findings/Result: The study identified phishing, Baiting, Pretexting, Quid Pro Quo, Honey Trap, Tail Gating, and Pharming as the major SEA techniques used to exploit E-government systems. Furthermore, the author suggest training and awareness programme as the most effective way to detect as well as prevent SEA in E-government system. Users should be aware of the languages with terms requesting urgent response as well as unusual or unexpected situation in a suspicious messages or attachment as factors to detect SEA. Technical controls using natural language processes (NLP), security policies, multifactor authentication (MFA) as well as secured preservation of confidential information from suspicious users are some of the SEA preventive measures. Originality/Value: A flexible and efficient interaction among citizens, businesses and government organizations is a critical factor for successful E-Government system. SEA is one of major challenges affecting communications in E-government system that requires attention. In conclusion, studies toward technological approach for solution of SEA in E-government is recommended. Paper Type: Conceptual Research.

Publisher

Srinivas University

Subject

General Medicine

Reference43 articles.

1. Marczak, William R., and Vern Paxson. (2017). Social Engineering Attacks on Government Opponents: Target Perspectives. Proc. Priv. Enhancing Technol., 1(2), 172-185.

2. Abu-Shanab, E., & Bataineh, L. Q. (2014). Challenges facing e-government projects: how to avoid failure?. International Journal of Emerging Sciences, 4(4), 207-217.

3. Chinta, M., Alaparthi, J., & Kodali, E. (2016). A Study on Social Engineering Attacks and Defence Mechanisms. International Journal of Computer Science and Information Security (IJCSIS), 14(1), 225-231.

4. Chitrey, A., Singh, D., & Singh, V. (2012). A comprehensive study of social engineering-based attacks in india to develop a conceptual model. International Journal of Information and Network Security, 1(2), 45-53.

5. Ivaturi, K., & Janczewski, L. J. (2012). A Typology of Social Engineering Attacks-An Information Science Perspective. In PACIS. 1(1), 145-160.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3