Review
BibTex RIS Cite

IT Security Trends for E-government Threats

Year 2019, Volume: 3 Issue: 2, 105 - 110, 23.12.2019

Abstract

Information Security is the
implementation of measures and systems designed to safeguard information using
various systems and algorithms on different attributes and behaviors of data
and information. Although many security products, projects and solutions have
been developed to ensure confidentiality, integrity and availability of the
information and systems in the e-government environment, there occurs many
errors and control weaknesses in applications that new threats began to exploit.
Because many other security problems have appeared in these applications, sometimes
inappropriate or insufficient measures caused a waste of resources, time and
money for e-services provided by local and central government organizations. Security
trends have to keep up with the threats that always tend to use new methods
according to latest innovative technology of both software and hardware. The
content of this paper is consisting of some IT Security trends for e-government
environment. We try to seek how security trends evolve over time according to
new threats and innovative technology.

References

  • [1] Salah-ddine Krit and Elbachir Haimoud, ”Review on the IT security: Attack and defense”, IEEE, 2016
  • [2] Temiz Semanur, Yilmaz Bülent, “Awareness of Information Security in Information Centers: Sample of Academic Libraries in Ankara”, 2013
  • [3] Richardson R.,”CSI Computer Crime and Security Survey” 2008, http://www.kwell.net/doc/FBI2008.pdf
  • [4] Spiekermann S., Lorrie Faith Cranor, ”Engineering Privacy,” IEEE Transactions on Software Engineering, pp. 67-82, 2009
  • [5] Microsoft Security Lifecycle (SDL) Version 3.2
  • [6] Software Assurance Maturity Model, “A Guide to Building Security into Software Development Version. 1.0”,
  • [7] IBM Internet Security Systems, X-Force 2008 Trend and Risk Report, January 2009
  • [8] Christos G. Panayiotou, Georgios Ellinas, Elias Kyriakides, Marios M. Polycarpou, “Critical Information Infrastructures Security”, 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014.
  • [9] Igure V., Laughter S., Williams R., “Security Issues in SCADA Networks”, Computer and Security, p496-506, Elsevier, 2009
  • [10] Madhavi Dhingra, Manisha Jain, Rakesh Singh Jadon, ”Role of Artifical Intelligence in Enterprise Information Security: A Review ”, IEEE, 2016
  • [11] Organisation for Economic Co-operation and Development, Public Management Service, PUMA 16/ANN/Rev1 (2001). “E-Government: analysis framework and methodology” http://search.oecd.org/officialdocuments/publicdisplaydocumentpdf/?cote=PUMA(2001)16/ANN/REV1&docLanguage=En (Link at 21-October-2017)
  • [12] Brian M. Bowen, Ramaswamy Devarajan, Salvatore Stolf (2012). “Measuring the Human Factor of Cyber Security”. Homeland Security Affairs, Supplement 5, article 2.http://academiccommons.columbia.edu/catalog/ac%3A142664
  • [13] http://www.information-age.com/uber-hack-affects-2-7m-uk-customers-123469804/
Year 2019, Volume: 3 Issue: 2, 105 - 110, 23.12.2019

Abstract

References

  • [1] Salah-ddine Krit and Elbachir Haimoud, ”Review on the IT security: Attack and defense”, IEEE, 2016
  • [2] Temiz Semanur, Yilmaz Bülent, “Awareness of Information Security in Information Centers: Sample of Academic Libraries in Ankara”, 2013
  • [3] Richardson R.,”CSI Computer Crime and Security Survey” 2008, http://www.kwell.net/doc/FBI2008.pdf
  • [4] Spiekermann S., Lorrie Faith Cranor, ”Engineering Privacy,” IEEE Transactions on Software Engineering, pp. 67-82, 2009
  • [5] Microsoft Security Lifecycle (SDL) Version 3.2
  • [6] Software Assurance Maturity Model, “A Guide to Building Security into Software Development Version. 1.0”,
  • [7] IBM Internet Security Systems, X-Force 2008 Trend and Risk Report, January 2009
  • [8] Christos G. Panayiotou, Georgios Ellinas, Elias Kyriakides, Marios M. Polycarpou, “Critical Information Infrastructures Security”, 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014.
  • [9] Igure V., Laughter S., Williams R., “Security Issues in SCADA Networks”, Computer and Security, p496-506, Elsevier, 2009
  • [10] Madhavi Dhingra, Manisha Jain, Rakesh Singh Jadon, ”Role of Artifical Intelligence in Enterprise Information Security: A Review ”, IEEE, 2016
  • [11] Organisation for Economic Co-operation and Development, Public Management Service, PUMA 16/ANN/Rev1 (2001). “E-Government: analysis framework and methodology” http://search.oecd.org/officialdocuments/publicdisplaydocumentpdf/?cote=PUMA(2001)16/ANN/REV1&docLanguage=En (Link at 21-October-2017)
  • [12] Brian M. Bowen, Ramaswamy Devarajan, Salvatore Stolf (2012). “Measuring the Human Factor of Cyber Security”. Homeland Security Affairs, Supplement 5, article 2.http://academiccommons.columbia.edu/catalog/ac%3A142664
  • [13] http://www.information-age.com/uber-hack-affects-2-7m-uk-customers-123469804/
There are 13 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Articles
Authors

Ahmet Efe

Hasan Kazdal This is me

Publication Date December 23, 2019
Submission Date March 7, 2018
Published in Issue Year 2019 Volume: 3 Issue: 2

Cite

IEEE A. Efe and H. Kazdal, “IT Security Trends for E-government Threats”, IJMSIT, vol. 3, no. 2, pp. 105–110, 2019.