App Logo

No.1 PSC Learning App

1M+ Downloads

Which of the following describe potential security threats to e-governance systems?

  1. Denial of Service (DoS) attacks can render e-governance services inaccessible.
  2. Spoofing allows attackers to gain unauthorized access by pretending to be someone else.
  3. Privilege escalation enables attackers to perform actions reserved for high-level users.
  4. Unauthorized Data Manipulation involves the lawful modification of confidential information.

    A3

    B1, 3

    C1, 4

    D1, 2, 3

    Answer:

    D. 1, 2, 3

    Read Explanation:

    E-governance systems are vulnerable to a range of cyber threats. DoS attacks aim to disrupt services by overwhelming servers. Spoofing is a deceptive practice where attackers impersonate legitimate users or systems. Privilege escalation is a technique used by attackers to gain unauthorized access to higher-level system functionalities and data. Unauthorized Data Manipulation, conversely, is an illegal act of altering or modifying data. Protecting e-governance systems requires a multi-layered security approach, including network security, access controls, encryption, and regular security audits.

    Related Questions:

    What has increased in recent years, leading organizations to adopt e-governance?
    Why might people find it difficult to use government websites and applications?
    24മത് നാഷണൽ ഇ ഗവെണൻസ് കോൺഫറൻസിൽ 2020-21 നാഷണൽ ഇ-ഗവെണൻസ് അവാർഡ് നേടിയത് ?
    What is a key characteristic of e-governance that distinguishes it from e-government?

    Which of the following statements accurately describes the role of technology in E-governance?

    1. Technology simplifies complex government procedures and structures within E-governance.
    2. E-governance uses technology to make government processes slower and less efficient.
    3. The internet and smartphones facilitate rapid and efficient information transmission in E-governance.
    4. E-governance reduces the need for ICT as it relies on traditional methods.