Challenger App

No.1 PSC Learning App

1M+ Downloads

Which of the following are security drawbacks of e-governance?

  1. Spoofing involves an attacker impersonating a legitimate user or using a false IP address to gain unauthorized access.
  2. Unauthorized data manipulation allows an attacker to lawfully alter confidential information.
  3. Repudiation is a risk where a user can deny a transaction they were involved in.
  4. Denial of Service (DoS) attacks involve overwhelming a server with requests to make it unavailable.

    Aii, iv

    Biii, iv

    Ciii

    Di, iii, iv

    Answer:

    D. i, iii, iv

    Read Explanation:

    E-governance, while beneficial, faces several security challenges. Spoofing is a technique where attackers pretend to be legitimate users or use fake IP addresses to infiltrate systems. Unauthorized data manipulation involves the illegal alteration of sensitive information. Repudiation is a significant risk where individuals can deny their participation in digital transactions, compromising the integrity of records. Denial of Service (DoS) attacks aim to disrupt services by overwhelming servers, rendering them inaccessible to legitimate users. Privilege escalation allows attackers with basic access to gain higher-level permissions. Cybercrimes pose a constant threat to the security and integrity of e-governance systems. Unauthorized information disclosure, or data breaches, can lead to the exposure of sensitive personal and governmental data.

    Related Questions:

    Analyze the statements about the NeGP's launch and objectives. Which statement is incorrect?

    1. The National e-Governance Plan (NeGP) was launched in India on May 18, 2006.
    2. A key objective of NeGP is to increase the complexity of accessing government services.
    3. NeGP aims to empower citizens with convenient and transparent government service options.
    4. The plan seeks to make all government services accessible to the common person in their locality.

      What is the role of ICFOSS in capacity building?

      1. ICFOSS offers extensive training in FOSS software, hardware, technology, and tools to state government employees and PSUs.
      2. The training programs are exclusively for beginners with no prior IT knowledge.
      3. ICFOSS extends its training initiatives to the higher education level to encourage FOSS adoption in academic institutions.
      4. Capacity building is limited to theoretical knowledge without practical application.

        Regarding the features of the Academic Bank of Credits (ABC), identify the correct statements.

        1. ABC allows for multiple entry and exit points in academic programs.
        2. Academic credits are stored by ABC for a minimum of 7 years.
        3. Credit transfer between institutions requires approval only from the destination institution.
        4. Only unverified institutions can upload credits to enhance flexibility.
          അക്ഷയകേന്ദ്രങ്ങൾ വഴി ഭിന്നശേഷിയുള്ള കുട്ടികൾക്ക് പരിശീലനം നൽകുന്ന പദ്ധതി
          What is the full form of "Viksit Bharat"?