A Review on Cyberattacks

2020 ◽  
pp. 98-126
Author(s):  
Gaganjot Kaur Saini ◽  
Malka N. Halgamuge ◽  
Pallavi Sharma ◽  
James Stephen Purkis

Research questions remain to be answered in terms of discovering how security could be provided for different resources, such as data, devices, and networks. Most organizations compromise their security measures due to high budgets despite its primary importance in today's highly dependent cyber world and as such there are always some loopholes in security systems, which cybercriminals take advantage of. In this chapter, the authors have completed an analysis of data obtained from 31 peer-reviewed scientific research studies (2009-2017) describing cybersecurity issues and solutions. The results demonstrated that the majority of applications in this area are from the government and the public sector (17%) whereas transportation and other areas have a minor percentage (6%). This study determined that the government sector is the main application area in cybersecurity and is more susceptible to cyber-attacks whereas the wireless sensor network and healthcare areas are less exposed to attack.


Author(s):  
Gaganjot Kaur Saini ◽  
Malka N. Halgamuge ◽  
Pallavi Sharma ◽  
James Stephen Purkis

Research questions remain to be answered in terms of discovering how security could be provided for different resources, such as data, devices, and networks. Most organizations compromise their security measures due to high budgets despite its primary importance in today's highly dependent cyber world and as such there are always some loopholes in security systems, which cybercriminals take advantage of. In this chapter, the authors have completed an analysis of data obtained from 31 peer-reviewed scientific research studies (2009-2017) describing cybersecurity issues and solutions. The results demonstrated that the majority of applications in this area are from the government and the public sector (17%) whereas transportation and other areas have a minor percentage (6%). This study determined that the government sector is the main application area in cybersecurity and is more susceptible to cyber-attacks whereas the wireless sensor network and healthcare areas are less exposed to attack.



Author(s):  
Disha Garg ◽  
Kartik Sharma ◽  
Parul Nayar ◽  
Shubhi Goyal ◽  
Shruti S Nagdeve

Purpose: With the conception of one’s professional life, it is essential to understand all the possibilities and opportunities that lie before them. In the case of architecture, there exists a bias towards the private sector where newly graduate students aspire to work in private practices and possibly even envision a practice of their own at a certain point in life. While there is nothing wrong with envisioning a future in the private sector, it is also essential to be aware about the public sector and understand the opportunities it provides to be able to make an informed decision. There is a preconceived notion about the monotonous nature of government jobs and a lack of awareness about students about the opportunities in this sector. Hence, it becomes crucial to understand the numerous opportunities this sector has to offer and thus, explore the potential of architects in government organizations. Methodology: The research for this paper has been done by referring to existing literature and interviews with concerned people. With an understanding of how and why is the government sector an essential  area of research for budding architects and planners. The research was done through interviews and possible case studies was done based on review of existing literature. Main Findings: The government is one sector with tremendous possibilities in the realm of architecture but is often plagued with stereotypes and preconceptions which have emerged over the years. It is imagined to be “lazy”, “uninnovative” and “non-productive” but this sector has evolved over the recent years and is now shaping to be one of the more lucrative sectors for practice. The number of perks, benefits and a clear comparative advantage of a higher salary, added with the direct contribution towards serving the nation, the government sector clearly has an unrealised potential for architectural professionals. Implications: With younger architetcs having preconceived notions about role of architetcs in a government sector limited to unexciting set of designs without creativity, this article may help bring a fresh thought process to choose professional sector wisely.



Author(s):  
Carkiman Carkiman ◽  
Shandy Rikmansyah ◽  
Sandi Mahardi ◽  
Muhammad Adi Kuncoro

Melayani  masyarakat  ataupun  publik  dengan  menggunakan media teknologi informasi dan komunikasi berbasis  website  hampir  dilakukan  oleh  semua  sektor, termasuk sektor pemerintah seperti halnya pemerintahan ditingkat kabupaten. pemerintah kabupaten yang sudah memiliki website resmi diantaranya kab.subang  (subang.go.id), kab.bandung barat (bandungbaratkab.go.id), dan kab.cianjur (cianjurkab.go.id) yang  menjadi  fokus  penelitian ini. Keberadaan  website  resmi  milik  pemerintah, perlu dilakukan  pengukuran  kinerja  dan serta kualitas dari website tersebut dengan menggunakan alat uji  GTMetrix, WebPageTest, dan WAVE. Berdasarkan hasil pengujian dengan GTMetrix, maka website resmi pemerintah kabupaten  subang termasuk  kategori  lambat  dengan  waktu  tampil  18.9s,  sedangkan  untuk  website resmi pemerintah kabupaten cianjur  dan  kabupaten  bandung barat dengan waktu tampil  33.5s dan  31.0s  termasuk  kategori sangat  lambat. Berdasarkan  hasil  pengujian  dengan WebPagetest,  maka  website  resmi pemerintah kabupaten  Cianjur  memiliki  nilai performa baik dengan waktu tampil 20.015s dibandingkan dengan  kabupaten  subang dengan waktu tampil 65.871s dan  bandung  barat  dengan  waktu tampil  39.574s. Berdasarkan  hasil pengujian dengan WAVE, maka website resmi pemerintah  kabupaten  Bandung Barat memiliki nilai error sedikit  dengan jumlah  9 error dibandingkan dengan  kabupaten  subang dengan jumlah  61  error dan  kabupaten  cianjur  dengan  jumlah  168 error. Penelitian ini menyatakan bahwa dengan  fokus load time dari ketiga website resmi pemerintah kabupaten  tersebut, maka Semakin  kecil  angka  loadtime  yang dihasilkan, maka  kinerja  website  semakin  baik  dan  juga  Kualitas  sebuah  website  sangat  berpengaruh  terhadap minat    pengguna  ataupun  masyarakat  untuk  mengakses  website tersebut. saran  yang  dapat  diberikan berdasarkan hasil pengujian diatas adalah  meningkatkan  kinerja website  resmi pemerintah  terlebih  difokuskan  pada  load time website, dan  dari ketiga website resmi tersebut parameter security score nilainya F  itu  artinya  perlu ditingkatkan keamanan dari website milik pemerintah tersebut, sehingga dapat memberikan  kenyamanan dan  minat  pengguna untuk  mengakses  lnformasi  yang  terdapat  pada website  resmi  pemerintah  daerah  tersebut. Serving the public or the public by using information technology and website-based communication media is practiced by almost all sectors, including the government sector as well as the district level government. District governments that already have official websites include Kab.subang (subang.go.id), Kab.bandung Barat (bandungbaratkab.go.id), and Kab.cianjur (cianjurkab.go.id) which are the focus of this research. The existence of an official government website, it is necessary to measure the performance and quality of the website using the GTMetrix, WebPageTest, and WAVE test tools.  Based on the results of testing with GTMetrix, the official website of the Subang district government is in the slow category with a display time of 18.9s, while the official websites of the Cianjur regency and West Bandung regencies with a display time of 33.5s and 31.0s are in the very slow category. Based on the results of testing with WebPagetest, the official website of the Cianjur regency government has a good performance score with a display time of 20,015s compared to Subang district with a display time of 65,871s and Bandung Barat with a display time of 39,574s. Based on the results of testing with WAVE, the official website of the West Bandung district government has a slight error value with 9 errors compared to Subang district with 61 errors and Cianjur district with 168 errors. This research states that with the focus on the load time of the three official websites of the regency government, the smaller the load time is generated, the better the performance of the website and the quality of a website greatly affects the interest of users or the public to access the website. The suggestion that can be given based on the test results above is to improve the performance of the official government website, especially focused on the load time of the website, and from the three official websites the parameter of the security score is F, which means that the security of the government-owned website needs to be increased, so that it can provide user comfort and interest. to access information contained on the official website of the local governmen



Author(s):  
Yosua Ade Pohan ◽  
Yuhandri Yunus ◽  
S Sumijan

Regional Tax Reporting Application Webserver is one of the public services for taxpayers to report their sales transactions. This application can be accessed on the domain http://sptpd.payakumbuhkota.go.id. This application is public, so the principles of information security must be applied to prevent cyber attacks. The principles of information security include confidentiality, integrity, and availability. To apply this information security principle, it is necessary to conduct vulnerability assesment of the application webserver. This study aims to improve the security of the application webserver so that the data and information in it is secure. The method used in this study is the Penetration Testing Execution Standard which is one of the methods developed by the Pentest Organization to become a standard in analyzing or auditing security systems. The results of vulnerability testing using software Acunetix, Nikto, BurpSuite and Owasp, there are seven types of vulnerabilities, namely: X-Frame Header Options is Missing, CSRF Attack, Cookie Without Only Flash, DNS Vulnerability, Ddos Attack, Bruteforce Page Login and Open Port. The vulnerability can be exploited, where the level of application vulnerability is in the medium category. The recommendations for fixing vulnerabilities can be applied by the developer, so that after repairs are made, the vulnerability level of the application webserver is in the low category and there is only one type of vulnerability, namely BruteForce Page



Author(s):  
Yasser A. Seleman

  The e-governance is the concept and structure of the system and the functions and activities of all activities and processes in e-business on the one hand the level of e-government and business on the other.               Because the government sector as a significant proportion of the total economic sectors in most countries of the world, and the fact that dealing with the public sector is not limited to the class and not others, but prevail all citizens and residents, institutions and others, and the fact that this multi-dealing in quality, methods and how it is done and models for different procedures and steps implemented and locations between the corridors of government departments, the concept of e-government came as an ideal way for the government to enable them to take care of the interests of the public from individuals and institutions electronically using cutting-edge technology without the need for the applicant to move between government departments.  



2018 ◽  
Vol III (III) ◽  
pp. 94-129
Author(s):  
Muhammad Zia Ur Rehman ◽  
Ahsan Rafiq ◽  
Waseem Ishaque

The paper focuses on the various aspects especially as globally accepted fact is that social and key economic indicators are influenced by the government activities. Public Sector Performance and efficiency reflect government priorities. The paper evaluates the public sector performance of Pakistan by calculating the Public Sector Performance Index based on seven indicators and these seven indicators are further classified into two broad groups. Many international studies have carried out the performance evaluation of public sectors of industrialized countries missing the public sector performance of Pakistan with other countries. With the aim, Public Sector Performance of Pakistan was compared with countries of South Asia and some developed countries. The research analyzes the public sector performance indicators of countries to calculate the overall performance. The paper aims to compare public sector performance of Pakistan with South Asian Countries and members of Organization of Economic Cooperation and Development (OECD), which currently includes 34 Countries.



Author(s):  
Yosua Ade Pohan

Regional Tax Reporting Application Webserver is one of the public services for taxpayers to report their sales transactions. This application can be accessed on the domain http://sptpd.payakumbuhkota.go.id. This application is public, so the principles of information security must be applied to prevent cyber attacks. The principles of information security include confidentiality, integrity, and availability. To apply this information security principle, it is necessary to conduct vulnerability assesment of the application webserver. This study aims to improve the security of the application webserver so that the data and information in it is secure. The method used in this study is the Penetration Testing Execution Standard which is one of the methods developed by the Pentest Organization to become a standard in analyzing or auditing security systems. The results of vulnerability testing using software Acunetix, Nikto, BurpSuite and Owasp, there are seven types of vulnerabilities, namely: X-Frame Header Options is Missing, CSRF Attack, Cookie Without Only Flash, DNS Vulnerability, Ddos Attack, Bruteforce Page Login and Open Port. The vulnerability can be exploited, where the level of application vulnerability is in the medium category. The recommendations for fixing vulnerabilities can be applied by the developer, so that after repairs are made, the vulnerability level of the application webserver is in the low category and there is only one type of vulnerability, namely Brute Force Page Login.



Author(s):  
Ali Kassem ◽  
Bogdan Stefan Ionescu

Abstract Public Accounting is one of the very rising sectors in the industry. The aim is to produce bulk of financial information that can be further used for making informed decisions by the stakeholders. The wrong information or might jeopardize the involved businesses and thus it is necessary to protect this sort of information from outside and vulnerable attacks. As, the transparency and accountability of financial statement is very crucial for the stakeholder’s trust as well as the investment, the security of financial information is very essential for the relevance, validity, and reliability of the financial data. However, there is always a lingering risk of security breaches such as brute force attacks to get the information. The main focus of this paper is to examine the security systems and the strategies used by the public accountants in Lebanon to secure the financial data and relevance of financial reports. To carry out this study a quantitative methodology was applied and a survey was conducted with a representative sample of accountants, who are currently employed in the Lebanese governmental sector. The survey questionnaire was prepared to measure their perceptions regarding the security of the public accounting in Lebanon and to also evaluate their efficiency in protecting the data as well as detecting threats. The research conducted is likely to determine the quality of financial data protection in public accounting in Lebanon and suggest possible solutions in increasing security. As, the security measures are an integral part of the IPSAS implementation process this study highly contributes to both the theory of the IPSAS adoption and the practice of aligning local accounting practices in accordance to the international standards by doing exorbitant efforts to strengthen the security management in Lebanon’s Public Accounting Sector.



Author(s):  
Bijaya Krushna Mangaraj ◽  
Upali Aparajita

In the era of economic liberalisation, institutions of higher education in the government sector, particularly universities, are facing tremendous challenges in terms of academic, general, and financial administration, which need effective governance. Recently, some of the universities are trying to adopt e-governance as a platform for such a purpose. However, the design of such a system is very much important, as it has to cater to the needs of various stakeholders in the public system. In this context, the effectiveness measurement of such an e-governance system is really necessary either to improve its performance level by re-aligning its organisational culture or by providing inputs for re-designing the system in order to make it more effective. Hence, the performance of such a system can be known if a human-centric approach with multiple criteria of evaluation is considered in the governance environment. This chapter attempts to determine those criteria by multiple factor analyses carried out for the purpose of considering multiple stakeholders. Analytic hierarchical processes as well as fuzzy analytic hierarchical processes have been then employed to measure the effectiveness of e-governance systems along those criteria, taking an Indian university as a case study.



Author(s):  
Fahmi Ibrahim ◽  
Hazimah Suhip ◽  
Kabiru Maitama Kura ◽  
Liana H. M. Noor

With the high demands to provide service quality, growing workforce, and globalization of economy, HR has transformed into an inevitable power of technology that transforms HRM into electronic human resource management (E-HRM) systems. Brunei Darussalam without exception is also practicing E-HRM in the government sector called government employee management system (GEMS). This chapter investigates the user satisfaction of E-HRM by examining the current status of GEMS in Brunei Darussalam. The user satisfaction was studied through seven elements: the implementation of E-HRM, training, user-friendliness, infrastructure, data security, technical support, and user support. Qualitative interview and descriptive quantitative method were conducted on HR officers from the public organization. Findings revealed that the GEMS are not able to provide satisfactory system. This chapter has developed a theoretical framework as a recommendation to integrate relevant elements, together with the influence of age, gender, and years of service that impact user satisfaction.



Sign in / Sign up

Export Citation Format

Share Document