Which of the following are security drawbacks of e-governance?
- Spoofing involves an attacker impersonating a legitimate user or using a false IP address to gain unauthorized access.
- Unauthorized data manipulation allows an attacker to lawfully alter confidential information.
- Repudiation is a risk where a user can deny a transaction they were involved in.
- Denial of Service (DoS) attacks involve overwhelming a server with requests to make it unavailable.
Aii, iv
Biii, iv
Ciii
Di, iii, iv