App Logo

No.1 PSC Learning App

1M+ Downloads

Which of the following are security drawbacks of e-governance?

  1. Spoofing involves an attacker impersonating a legitimate user or using a false IP address to gain unauthorized access.
  2. Unauthorized data manipulation allows an attacker to lawfully alter confidential information.
  3. Repudiation is a risk where a user can deny a transaction they were involved in.
  4. Denial of Service (DoS) attacks involve overwhelming a server with requests to make it unavailable.

    Aii, iv

    Biii, iv

    Ciii

    Di, iii, iv

    Answer:

    D. i, iii, iv

    Read Explanation:

    E-governance, while beneficial, faces several security challenges. Spoofing is a technique where attackers pretend to be legitimate users or use fake IP addresses to infiltrate systems. Unauthorized data manipulation involves the illegal alteration of sensitive information. Repudiation is a significant risk where individuals can deny their participation in digital transactions, compromising the integrity of records. Denial of Service (DoS) attacks aim to disrupt services by overwhelming servers, rendering them inaccessible to legitimate users. Privilege escalation allows attackers with basic access to gain higher-level permissions. Cybercrimes pose a constant threat to the security and integrity of e-governance systems. Unauthorized information disclosure, or data breaches, can lead to the exposure of sensitive personal and governmental data.

    Related Questions:

    What are the primary ways E-governance utilizes Information and Communications Technology (ICT)?

    1. ICT is used in E-governance to reform and improve government operations.
    2. ICT in E-governance enables faster communication and rapid transmission of information.
    3. ICT is primarily used to replace digital records with physical ones.
    4. ICT implementation in E-governance does not affect the speed of government processes.

      Which of the following statements accurately reflect the challenges and strategies related to building user confidence in e-governance technology?

      1. A primary obstacle for e-governance is establishing user trust and confidence in the digital services offered by the government.
      2. To encourage the adoption of digital services, users need to feel secure and at ease when interacting with government technology.
      3. Implementing overly complex security measures can deter honest citizens, thereby reducing the overall effectiveness of e-governance systems.
      4. The government's role is limited to ensuring the security of transactions, with no responsibility for user data protection.
        UNESCO's definition of e-Governance highlights the role of electronic platforms in incorporating:

        Which entities should be acknowledged for their supportive role in national disaster risk reduction frameworks?

        1. National Red Cross and Red Crescent Societies should be fully acknowledged for their supportive role.
        2. Only governmental organizations are recognized for their support in disaster management.
        3. International organizations are the sole providers of support in disaster risk reduction.
        4. Domestic civil society groups play no significant role in disaster management frameworks.
          ⁠Business Intelligence (BI) tools are used in MIS for: