1 of 13

Safeguarding E-Government in a Cyber World

MR. MUHAMMAD UMAIR ALI & MS. HARISA SHAHID

2 of 13

Table of Contents

  1. Definitions
  2. E-Governance Landscape
  3. Significance of Security in E-Governance
  4. Types and Examples of Cyber Attacks
  5. Low & High Risk Countries for Cyber Threats
  6. Challenging in Securing E-Governance
  7. Case Study on Cybercrimes Against Government
  8. Best Practices for a Secure E-Government

3 of 13

Definition

Electronic Governance is the application of Information and Communication Technologies (ICTs) for delivering government services through integration of various stand-alone systems between Government-to-Citizens (G2C), Government-to-Business (G2B), and Government-to-Government(G2G) services.

E-governance security can be defined as protecting citizen data, government operations, and critical infrastructure from a wide range of cyber threats,

4 of 13

Current E-Governance Landscape 

Website Development for Government Departments

Online Forms and Services

Digital Identity Document Management

E-Voting

Online Citizen Feedback and Complaint Filing System

Digital Health Records

Public Bidding Systems

5 of 13

Significance of Security in E- Governance

  • Citizen Trust and Confidence: 
  • Protection of Sensitive Data
  • National Security
  • Data Privacy and Legal Compliance:

6 of 13

    • Viruses
    • Torjans
    • Spyware

Malware Attacks

    • Abuse of authority
    •  Careless handling of data
    •  Mixing personal and private date

Data Breaches

    • Email Phishing
    • Speer Phishing
    • Whaling

Phishing Attacks

    • Social Engineering
    • Catfishing

Cyber Espionage

Cyberattacks

7 of 13

Lowest Risk Countries for Cyber Threats

HTTPS://SEON.IO/RESOURCES/GLOBAL-CYBERCRIME-REPORT/#:~:TEXT=HERE%20WE'VE%20LISTED%20THE,%2C%2018.60%2C%20AND%2019.72%20RESPECTIVELY

8 of 13

High-Risk Countries for Cyber Threats

HTTPS://SEON.IO/RESOURCES/GLOBAL-CYBERCRIME-REPORT/#:~:TEXT=HERE%20WE'VE%20LISTED%20THE,%2C%2018.60%2C%20AND%2019.72%20RESPECTIVELY

9 of 13

Challenges and Best Practices for  E-Government Security

This Photo by Unknown author is licensed under CC BY-NC.

10 of 13

Challenges in Securing E-Governance

Insider Threats

1

Vulnerability in Legacy Systems

2

Lack of cybersecurity awareness.

3

Budget Constraints 

4

Technical Issues

5

11 of 13

Case Study: Cyberattack on Baltimore City

  • Threat actors successfully deployed Robbin-Hood ransomware against the City of Baltimore in 2019, which ended up costing the city $18.2 million. The attack compromised the city’s networks, took its email system offline, and adversely impacted its dispatch system.
  • Cyber-attack type: Robbin-Hood ransomware
  • Location: Baltimore
  • Cost: $18.2 million
  • People affected: Undisclosed
  • The attackers demanded a payment of $76,000, which officials declined to pay. Ultimately, however, Baltimore experienced a loss that far exceeded the ransom request.

12 of 13

Best Practices for a Secure E-Government

Use cloud-based technology

Forge a dedicated National Critical Infrastructure Protection Pland and a Disaster Recovery Plan

Switch to a .gov Domain

Encrypt Sensitive Information

Cyber Security Training for Employees

Develop Cybersecurity Legislation and Compliance

13 of 13