Challenger App

No.1 PSC Learning App

1M+ Downloads

Which of the following are security drawbacks of e-governance?

  1. Spoofing involves an attacker impersonating a legitimate user or using a false IP address to gain unauthorized access.
  2. Unauthorized data manipulation allows an attacker to lawfully alter confidential information.
  3. Repudiation is a risk where a user can deny a transaction they were involved in.
  4. Denial of Service (DoS) attacks involve overwhelming a server with requests to make it unavailable.

    Aii, iv

    Biii, iv

    Ciii

    Di, iii, iv

    Answer:

    D. i, iii, iv

    Read Explanation:

    E-governance, while beneficial, faces several security challenges. Spoofing is a technique where attackers pretend to be legitimate users or use fake IP addresses to infiltrate systems. Unauthorized data manipulation involves the illegal alteration of sensitive information. Repudiation is a significant risk where individuals can deny their participation in digital transactions, compromising the integrity of records. Denial of Service (DoS) attacks aim to disrupt services by overwhelming servers, rendering them inaccessible to legitimate users. Privilege escalation allows attackers with basic access to gain higher-level permissions. Cybercrimes pose a constant threat to the security and integrity of e-governance systems. Unauthorized information disclosure, or data breaches, can lead to the exposure of sensitive personal and governmental data.

    Related Questions:

    What is the primary function of the Aadhaar number?

    1. To serve as a proof of Indian citizenship.
    2. To act as a unique identification for bank accounts only.
    3. To function as a valid proof of both identity and address.
    4. To track an individual's financial transactions.

      According to Thomas B. Riley, what is a common objective shared by both e-governance and e-government?

      1. To establish fully automated government services.
      2. To gain the consent and cooperation of the governed.
      3. To reduce the size of government bureaucracy.
      4. To implement a completely decentralized governance model.
        Which of the following is a goal of the 'Capacity Building Scheme' under NeGP?

        What role do digital signatures play in e-governance authentication?

        1. They are the primary method for verifying a user's identity online.
        2. They require minimal infrastructure and no updates.
        3. They are a cost-effective solution for authentication.
        4. They help in providing security by confirming a user's identity.
          What is the main objective of Government-to-Citizen (G2C) initiatives?