App Logo

No.1 PSC Learning App

1M+ Downloads
What specific threats are mentioned under technical challenges for e-governance?

APhysical damage to servers and data loss

BCyberattacks, data breaches, and fraud

CLow internet penetration and slow speeds

DPower outages and network failures

Answer:

B. Cyberattacks, data breaches, and fraud

Read Explanation:

  • Cyberattacks: These are malicious attempts by hackers to gain unauthorized access to government systems. The goal is often to steal or corrupt sensitive data, which can compromise national security and citizen privacy.

  • Data Breaches: This refers to the unauthorized release or theft of confidential information stored on government servers. A data breach can expose personal details like financial information and health records, leading to identity theft and a loss of public trust.

  • Fraud: Digital systems can be susceptible to fraud, where individuals manipulate information or transactions for personal gain. This includes financial scams and the misuse of public funds, which e-governance aims to prevent through transparent and secure systems.


Related Questions:

നിർദ്ദിഷ്ട ഇ-ഗവേണൻസ് സിസ്റ്റത്തിൻ്റെ മൊത്തത്തിലുള്ള ലക്ഷ്യങ്ങൾ ഉപയോക്താക്കൾക്ക് സെർച്ച് എഞ്ചിസുകൾ ഡൗൺലോഡ് ചെയ്യുന്നതിനുള്ള ഫോമുകൾ. ഡോക്യുമെൻ്റുകൾ ബന്ധപ്പെട്ട വകുപ്പുമായി ബന്ധപ്പെടുന്നതിനുള്ള ഇമെയിൽ സൗകര്യം എന്നിവ പോലുള്ള ഉപകരണങ്ങൾ നൽകുമ്പോൾ അത് ലക്ഷ്യമിടുന്നത്........................... ഇ-ഗവേണൻസ് മെച്യൂരിറ്റി മോഡലിൻ്റെ നിലവാരമാണ്
The E-Advocacy Model is a tool for civic engagement that allows citizens and interest groups to:
⁠The Aadhaar program is related to:
G2G interactions can be classified as horizontal or vertical. What do these classifications refer to?
What does the acronym SMART stand for in the context of e-governance?