• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2020, Volume: 13, Issue: 34, Pages: 3515-3520

Original Article

Security ambiguity and vulnerability in G2C eGovernance system: Empirical evidences from Indian higher education

Received Date:18 August 2020, Accepted Date:09 September 2020, Published Date:16 September 2020

Abstract

The Higher Education Institutions (HEIs) in India enhanced dependency on Information Communication Technology (ICT) based on G2C eGovernance applications persistently raised apprehension regarding cyber-attacks and breach of security. Objectives:The present study assesses the status of ambiguity and vulnerability pertaining to security aspects of HEIs G2C eGovernance web portals. Methods:Five prominent central and state HEIs i.e. Malaviya National Institute of Technology - Jaipur (MNIT), National Institute of Technology - Kurukshetra (NITK), Guru Nanak Dev University -Amritsar (GNDU), Maharshi Dayanand University – Rohtak (MDU), and Bhagat Phool Singh Mahila Vishwavidyalaya – Sonipat (BPSMV) were included in the study and Grey Box penetration testing method through open-source software’s Whois.sc, Yougetsignal.com, Kali Linux, Builtwith.com, NMAP, and Google Hacking Database (GHDB), etc. along with social engineering testing through external penetration strategy was applied to assess the ambiguity and vulnerability of HEIs. Findings:The analysis revealed that login IDs and passwords related to web portals, eResources, networks, etc. are freely available and shared without any authorization which is a major cause of security breach. The vulnerability test depicted unencrypted communication between the HEIs portals and servers and the absence of well-articulated security and privacy. Novelty: The study exhibits the lenient view of HEIs administration towards security aspects of G2C eGovernance projects and the outcome would enable the HEIs of India to develop a comprehensive security policy for enriching and securing the G2C eGovernance System.

Keywords: eGovernance; security; ambiguity; vulnerability; privacy policy; social engineering testing

References

  1. Falco E. Digital Community Planning. International Journal of E-Planning Research. 2016;5(2):1–22. Available from: https://dx.doi.org/10.4018/ijepr.2016040101
  2. Deekue SN. A strategic framework for e-government security: the case in Nigeria. University of Bedfordshire thesis
  3. Chaudhary O, Siddique AS. Cloud Computing Application: Its Security Issues and Challenges Faced During Cloud Forensics and Investigation. International Journal of Advanced Research in Computer Science. 2017;8(2):12–15. Available from: http://www.ijarcs.info/index.php/Ijarcs/article/view/2916
  4. Hassan GR, Khalifa OO. E-Government - an Information Security Perspective. International Journal of Computer Trends and Technology. 2016;36(1):1–9. Available from: https://dx.doi.org/10.14445/22312803/ijctt-v36p101
  5. Páez R, Pérez M, Ramírez G, Montes J, Bouvarel L. An Architecture for Biometric Electronic Identification Document System Based on Blockchain †. Future Internet. 2020;12(1). Available from: https://dx.doi.org/10.3390/fi12010010
  6. Saha S, Bhattacharyya D, Kim TH, Bandyopadhyay SK. Model based threat and vulnerability analysis of e-governance systems. International Journal of u- and e-Service Science and Technology. 2010;3(2):722. Available from: https://www.researchgate.net/publication/46157223_Model_Based_Threat_and_Vulnerability_Analysis_of_E-Governance_Systems
  7. Nulhusna R, Sandhyaduhita PI, Hidayanto AN, Phusavat K. The relation of e-government quality on public trust and its impact on public participation. Transforming Government: People, Process and Policy. 2017;11:393–418. Available from: https://dx.doi.org/10.1108/tg-01-2017-0004
  8. Mishra S. Organizational objectives for information security governance: a value focused assessment. Information and Computer Security. 2015;23(2):122–144. Available from: https://doi.org/10.1108/ICS-02-2014-0016
  9. Cigi-Ipsos. Centre for International Governance Innovation, UNCTAD and the Internet Society CIGI-Ipsos, UNCTAD and Internet Society. CIGI-Ipsos Global 2019Survey on Internet Security and Trust. . 2019. Available from: https://www.cigionline.org/internet-survey-2019
  10. Alsultanny AY. Assessment of E-Government Weak Points to Enhance Computer Network Security. International Journal of Information Science. 2014;4(1):13–20. Available from: https://doi.org/10.5923/j.ijis.20140401.03
  11. Joshi BS. Survey on need of cyber security and cyber awareness in e-governance plan in India. Multidisciplinary International Research Journal of Gujarat Technological University. 2019;1(1):15–20. Available from: http://www.researchjournal.gtu.ac.in/Combine/January%202019%20First%20Issue.pdf

Copyright

© 2020 Gill & Vij.This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Published By Indian Society for Education and Environment (iSee).

DON'T MISS OUT!

Subscribe now for latest articles and news.