Cyber Attacks

2011 ◽  
pp. 283-290
Author(s):  
Neil C. Rowe

Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks. Unfortunately, however, government systems can be especially vulnerable (Lucasik, Goodman, & Longhurst, 2003). This is in part because government is distributed over many locations, and therefore, it is hard to protect all of its information systems well. Second, many government systems must be accessible to a wide range of people (even if through a government intermediary), unlike the specialized systems used in other settings, and users will include a few fools and criminals. Third, governments often use popular business software, and the more popular that software is, the more attacks are known against it. Finally, there are many people with antipathy or grudges against governments for one reason or another, and they may seek revenge by attacking a government’s information system and data. With the global Internet, attackers need not be in the same country as the government they attack. Therefore, it is important to become familiar with the kinds of possible attackers, attacks, and countermeasures that governments could encounter on their computer systems and computer networks (Boswoth & Kabay, 2002; Schwartau, 2001).

Author(s):  
N. C. Rowe

Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks. Unfortunately, however, government systems can be especially vulnerable (Lucasik, Goodman, & Longhurst, 2003). This is in part because government is distributed over many locations, and therefore, it is hard to protect all of its information systems well. Second, many government systems must be accessible to a wide range of people (even if through a government intermediary), unlike the specialized systems used in other settings, and users will include a few fools and criminals. Third, governments often use popular business software, and the more popular that software is, the more attacks are known against it. Finally, there are many people with antipathy or grudges against governments for one reason or another, and they may seek revenge by attacking a government’s information system and data. With the global Internet, attackers need not be in the same country as the government they attack. Therefore, it is important to become familiar with the kinds of possible attackers, attacks, and countermeasures that governments could encounter on their computer systems and computer networks (Boswoth & Kabay, 2002; Schwartau, 2001).


2017 ◽  
Vol 7 (2) ◽  
pp. 35
Author(s):  
Sead Šadić ◽  
Adis Puška ◽  
Admir I. Beganović ◽  
Selma Berbić

When exploring the relationship between users and information systems, it is necessary to ascertain what impact the user's basic features have on their experience of the information systems they use in their work. Accordingly, this survey was conducted in the Government of Brčko within the district of Bosnia and Herzegovina, and within the Public company Brčko Municipality. The survey was conducted on 479 employees, while 261 employees completed the questionnaire developed for this research. When measuring the basic characteristics of the respondent’s gender was considered, as well as the work place, age, qualifications, their work experience and the amount of use of the information system weekly. When measuring the experience of using the information system, a modified model of performance of the information system was used. The SPSS 20.0 statistical software tool was applied during the testing of the proposed hypothesis, and the multivariate variance analysis (MANOVA) and the variance analysis (ANOVA) were used for the analysis. A factor analysis was used with the grouping of the proposed claims. The results obtained using this analysis show that in the modified model of success of the information system the statements were grouped into 4 factors. The hypothesis test results have shown that there is a significant statistical dependence on the use of information systems in almost all features of a user, except for the age of users where there is no statistical dependence. The results obtained from this research will contribute to a better understanding of how users experience information systems in their work and what basic features of the respondents affect the use of the system.


2020 ◽  
Vol 4 (2) ◽  
pp. 104
Author(s):  
Ridwan Ridwan ◽  
Mira Maisura

Several terms are used by the Government to collect data on the spread of covid-19's cases, namely People Under Surveillance (ODP), Patients Under Supervision (PDP), dead and positively infected. The Aceh government provides information on the spread of the covid-19 case through the official website media. Data of the cases are displayed daily based on the reports from districts / cities. District / city governments provide information based on reports from hospitals, health centers and from existing posts in each village. The unavailability of a data collection information system that can be used jointly in recording the spread of Covid-19 cases can lead to data duplication, because data collection is carried out according to individual needs. To overcome this problem, it is necessary to design and build a dissemination information system that can be used jointly between the village posts, sub-district offices, community health center (puskesmas) and hospitals. This research produces a website-based information system prototype for data collection on the spread of Covid-19 cases and API data services in the form of REST web services. Web Services are built using REST web services that generate request and response data using the JSON data format. The web services built can be used for integration with district / city and provincial government information systems, so that data changes can occur in real time.


Author(s):  
Majida Laaziri ◽  
Khaoula Benmoussa ◽  
Samira Khoulji ◽  
Kerkeb Mohamed Larbi ◽  
Abir El Yamami

<p>With the current explosion of Information Systems, the market offers a wide range of interesting technological solutions. Yet, this does not mean adopting a technology without considering its impact on the existing information system and user expectations. It is recommended to identify and implement the technological solutions most suited to the Information Systems strategy. Therefore, new methods are emerging and design tools are still evolving; the PHP Frameworks are part of it, which open up new perspectives in terms of information system enrichment. In this context, this paper focuses on the elaboration of a comparative study between Laravel, symfony framworks, which are the most popular PHP frameworks.  Thus, it provides an effective comparison model that merges seven dimensions: Features, Multilingual, System requirements, Technical architecture, Code Organization, Continuous Integration (CI) and finally Documentation and learning curve dimension. Results show that our model can be beneficial for IT project developers to select the suitable PHP Framework.</p><p> </p>


Author(s):  
W T Lesner ◽  
K G Hughes

Plant floor information systems are gaining popularity and importance in nearly every production environment. Current competitive and economic considerations demand that manufacturers be more concerned with obtaining the highest levels of efficiency and quality. In order to attain these goals, many manufacturers are implementing—or considering implementation of—computerized information systems. This paper examines the design of a plant floor information system for monitoring engine manufacture at the Cadillac engine plant.


Author(s):  
Anjali Dixit

Cybercrime is increasing rapidly in this digitized world. Be it business, education, shopping, or banking transactions, everything is on cyberspace. Cybercrime covers a wide range of different attacks such as financial cybercrime, spreading computer viruses or malware, internet fraud, pornography cybercrime, intellectual property rights violation, etc. Due to increased cyber-attacks these days, the online users must be aware of these kinds of attacks and need to be cautious with their data online. Each country has their own laws for dealing with cybercrime. The different measures taken by the government of India to combat cybercrime are explained in this chapter. How the potential use of data analytics can help in reducing cybercrime in India is also explained.


2014 ◽  
Vol 687-691 ◽  
pp. 1810-1813
Author(s):  
Wei Wang ◽  
Wen Ting Yang ◽  
Gui Xian Ye ◽  
Jun Lan Sun

Enterprise information system is based on the condition of the computer network technology information platform. It has an important value for enterprises to enhance its brand influence, enhance customer management, promote the development of e-commerce processes, promote enterprise management level, adapt to the current situation of information and other aspects of economic development. There are some problems in the current enterprise information system construction. The current information system should make scientific plan, expand information systems development space, play a catalytic role in the government promote, emphasis on information security, strengthen of human resources and team building starting implementation of enterprise information systems building strategy.


2019 ◽  
Vol 8 (1) ◽  
pp. 23-33
Author(s):  
Anindita Paul

Integrated information systems enable governments to provide better services to citizens. With the aid of such systems, citizens and service agents are able to communicate and resolve issues faster and with ease. The present study looks at an integrated information system employed in a government call centre in South India to gauge its value for the government and citizens. A holistic evaluation of the integrated information system was made in order to identify the impact on governance-centric values for citizen services. Analysis of call logs, process flows, citizen feedback and web-presence led to an understanding of aspects that disable better utilization of the integrated information systems for citizen-centric services. The call centre lagged in efficient resource allocation, agent utilization and process flow that are essential for creating value for the government by improving operations and processes. Citizen-centric values that were affected emerged mainly from the inadequateness in service quality and paucity of digital access. Resource utilization, process efficiency, higher participation by citizens through the digital medium and citizen satisfaction were seen as areas that could impact services offered to the citizens positively.


Author(s):  
Ownali Nurdin Mohamedali

In December 1973 the Prime Minster of Jamaica appointed a National Council on Libraries, Archives and Document Services (NACOLADS) to advise the government on the development of an integrated network information system. It was thought that this could best be done by using UNESCO's NATIS concept. Several working parties were established, and among their recommendations were the creation of a series of networks as the basis of a national information system, the establishment of a National Library (achieved in 1979), new legislation for the National Archives and Records Center (passed in 1982), and copyright legislation, with provision for legal deposit. NACOLADS incorporated all the recommendations into a national information plan, published in 1978. A revised edition in 1986 included recommendations for redressing a number of shortcomings (e.g. the need for improved salaries and conditions of service). In 1990 NACOLADS was renamed NACOLAIS (National Council on Libraries, Archives and Information Systems), and given additional responsibility for the expansion of NATIS in Jamaica. A copyright law was eventually passed in 1993, but laws for a national information policy and legal deposit remain to be enacted. Some believe that the experience of NATIS in Jamaica can be used as a model for the establishment of national information systems in other small Third World countries.


Sign in / Sign up

Export Citation Format

Share Document