Challenger App

No.1 PSC Learning App

1M+ Downloads

Which of the following describe potential security threats to e-governance systems?

  1. Denial of Service (DoS) attacks can render e-governance services inaccessible.
  2. Spoofing allows attackers to gain unauthorized access by pretending to be someone else.
  3. Privilege escalation enables attackers to perform actions reserved for high-level users.
  4. Unauthorized Data Manipulation involves the lawful modification of confidential information.

    A3

    B1, 3

    C1, 4

    D1, 2, 3

    Answer:

    D. 1, 2, 3

    Read Explanation:

    E-governance systems are vulnerable to a range of cyber threats. DoS attacks aim to disrupt services by overwhelming servers. Spoofing is a deceptive practice where attackers impersonate legitimate users or systems. Privilege escalation is a technique used by attackers to gain unauthorized access to higher-level system functionalities and data. Unauthorized Data Manipulation, conversely, is an illegal act of altering or modifying data. Protecting e-governance systems requires a multi-layered security approach, including network security, access controls, encryption, and regular security audits.

    Related Questions:

    How does e-governance contribute to improved public service delivery?

    1. By streamlining processes to speed up service delivery and make the system more responsive to citizen needs.
    2. By increasing the complexity of application forms and procedures.
    3. By limiting the channels through which citizens can access services.
    4. By reducing the amount of information available to the public about services.
      Which of the following systems is most closely associated with the automation of workflow and office tasks?
      What can a data breach in e-governance lead to?
      Which of the following fields commonly use Expert Systems?

      What are the key areas highlighted in a more comprehensive definition of e-governance?

      1. Transforming the business of government, including reducing costs and improving service delivery.
      2. Re-examining the functions of democracy, focusing on efficiency and accessibility.
      3. Shifting government focus exclusively to national security matters.
      4. Increasing the reliance on offline, paper-based administrative systems.