This website uses cookies to ensure you have the best experience. Learn more

Information Security: Introduction To Research Paper Regarding E Government Security Weakness

535 words - 3 pages

1. Introduction
The advances in information and communication technology (ICT) have made many electronic services possible. This revolution is not only changing the daily lives of people but is also changing the characteristics of interactions between governments and citizens. These changes, in turn, are rapidly being transformed into new forms of government named electronic government (e-government). Indeed, with many Information Technology (IT) applications such as electronic commerce, e-learning, and accompanying stories of success and failure, it is inevitable to participate in the e-government movement (Layne & Lee, 2001).
Electronic Government, or e-Government and its many synonyms, has been on the international agenda for several years. Since the late 1990s, governments at all levels have launched e-government projects in order to provide electronic information and services to ...view middle of the document...

The essence of e-government is using electronic information technology to break the boundary of administrative organizations, and build up a virtual electronic government. Provision of electronic government services is one of the main goals of many governments in the digital world, public and private organizations are facing a wide range of information threats, information security is a crucial component in their information systems (Wang, 2009).
Information security is a serious requirement which must be carefully considered, not as an isolated aspect, but as an element presented in all stages of the development lifecycle, from requirement analysis to implementation and maintenance (Devanbu & Stubblebine, 2000) (Ferrari & Thuraisingham, 2000). In this way, information assurance, security and privacy have moved from being considered by information systems designers as narrow topics of interest to become critical issues of fundamental importance in our society (Denker, Kagal, & Finin, 2005).
E-government services create new security challenges to government, business and citizens. Therefore an increased variety of security services is required (Basu, 2004) (Grant & Chau, 2005); (Hwang, Li, Shen, & Chu, 2004) (Lambrinoudakis, Gritzalis, Dridi, & Pernul, 2003) (Wimmer & Von Bredow, 2002). The first issues on security coming in mind regard of course technical aspects. Security aspects not only regard technical issues. Instead, these need careful investigation from a socio-technical viewpoint as well (Wimmer & von Bredow, 2001).
In this paper, we will carry out a systematic review of the existing literature on e-government security weaknesses with the objective of knowing, study and analyzing the most relevant literature. To perform this systematic review, the study on the guideline proposed by (Kitchenham, 2004) that is appropriate for software engineering researchers. In addition, it use a review protocol template developed by (Biolchini, Mian, Natali, & Travassos, 2005) which facilitates systematic reviews planning and execution in software engineering.

Find Another Essay On Information Security: Introduction to Research Paper Regarding e-government Security Weakness

information security Essay

574 words - 3 pages access by cyber criminals. The indian government spoke to media in 2010 that they were attacked by cyber criminals whose IP address when tracked revealed that they were from Pakistan and china .India eventually cut off the internet access of those departments in order to cut off the transmission towards those countries. Therefore the above three objectives of information security deal with data loss, cyber security and development of an

Information security Essay

2954 words - 12 pages from companies by pretending to be an employee and calling other employees to gain useful information. • Mail Servers are common targets when hackers want to gain access to network resources. Companies that access e-mail from the Internet, especially, are potential targets. To prevent a mail server from being attacked, ensure that the latest security patch is applied to both the operating system and the e-mail application. • Network hackers scan

E-Commerce Security

1515 words - 6 pages issues when participating in global e-commerce. This paper will look at how three internet companies are dealing with these issues and how they handle confidential data collected about consumers while conducting business to consumer transactions over the internet.BordersBorders is concerned with the security of personal information, but openly states that perfect security is nonexistent for web based transactions. The fact is that numerous risks

Controls to Diminish Information Security Risks

2320 words - 9 pages guarantee that the low cost vendor is not undermining the work effort as a measure to diminish internal expenditures (Smith, 2002). Conclusion The research goal was to present a BI plan to the CIO in an effort to promote outsourcing and offshoring IS activities. Topics included (a) strategies for updating technical hardware, software, service, and knowledge used in the reduction of information security risks; (b) the role of launch and analytical

Answers to Questions Regarding Banking and Security Issues

1807 words - 8 pages crime. Its server was hacked meaning there was a breakdown in its information system. If the security system was programmed strong enough to withstand the hackers the operational risk would be much less. (Outsourcing in Financial Services, February 2005) Question 3 Banks need to put in place an appropriate configuration, policies and procedures to assess, confirm, reevaluate, regulate and monitor the threats of all their outsourcing activities

Information Security Credentials

1389 words - 6 pages Credentials of Information Security Professionals: A summary of the various types of certificationsThe purpose of this document is to provide a summary of the various types of certifications available to information security professionals. A credential is best defined as a proof of qualification, competence, or clearance that is attached to a person, and often considered an attribute of that person. It is necessary for information security

Importance of Information Security

1666 words - 7 pages Information security Information Security refers to the procedures and techniques which are composed and implemented to ensure print, electronic, or other form of private and sensitive information from unapproved access, utilization, destruction, divulgence, change, or interruption. ( Need for Information security Business objectives and privacy drive the need for Information security. For a period, data

Ethics and Information Security

1074 words - 4 pages does not mean that they will not experience it in the future. The article regarding Bradley Manning’s revelations raised very pointed questions about the Army and its policies regarding information sharing. Bradley Manning is an American soldier who allegedly leaked important information regarding 700,000 classified government documents and passwords to access government systems. If legislative action is not taken to discourage actions similar

Information Security Final

1860 words - 8 pages as well as stored separately; this in turn reduces the likelihood of attackers obtaining keys to encryption and decryption. It is also essential to overwrite old memory locations that once held sensitive data that is no longer needed. This security measure increases the difficulty of accessing such critical information that may be useful to an attacker internally and/or externally. Nonetheless, above all, developers must establish who are

Information Security: Security Acts and Effectiveness

2438 words - 10 pages differences that occurred before and after the governmental regulations were enacted and provide an opinionated discussions on whether information is safer with the development and implementation of governmental regulations. FISMA On December 17, 2002, the Federal Information Security Management Act (FISMA) was enacted as part of the E-Government Act which sought to provide security requirements for governmental systems that do not play a vital role in

E-commerce: Security and Privacy

2129 words - 9 pages E-commerce: Security and Privacy As the evolution of the internet and purchasing online becomes popular, so do the security factors that contribute to the ways of eliminating fraud, theft, and acquiring personal information. E-commerce has created many new ways for customers to make payments including e-cash, e-cheques, and e-wallets. In the 21st century, many organizations worked hard at securing communications and payments made through

Similar Essays

Biometrics Introduction To Information Systems Security

622 words - 2 pages gathering information on people's travel patterns.Biometric devices and applications have been growing worldwide. They are expected to be the way for accessing personal computer systems. According to research it is expected that biometric expenditure will reach $300 million in 2008. Biometrics works on the principle that everyone in the world is different. A variety of factors are taken into consideration when implementing a biometric system. Each

Introduction To Border Security Essay

1269 words - 6 pages Zealand border to know when and where they need to focus their resources. To enable this, the Joint Border Management System (JBMS) is being developed in conjunction with New Zealand Customs. The JBMS is an electronic intelligence and information system which will help in clearing goods and people across the border (MAF BNZ, 2011). The Government-Industry Agreement (GIA) was approved by Cabinet in 2013. This is an agreement between the

Information Security Essay

2915 words - 12 pages organizations. This research paper discusses software and hardware firewalls with reference to accounting systems. Definition of firewall A firewall is a software program or specialized hardware devices, designed to check information entering or leaving the network; and either blocking it or allowing it to pass through a node - based on existing security settings (Zwicky, Cooper, & Chapman, 2009). It can also be defined as a rule based program or

Information Security Essay

1354 words - 5 pages IT securitySometimes referred to as computer security, Information Technology Security is information security applied to technology (most often some form of computer system). It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory. Such devices can range from non-networked standalone devices as simple as calculators, to networked mobile computing devices such