Vulnerabilities in e-governments
نویسندگان
چکیده
This paper shows that more than 80% of the E-Governments in the world are vulnerable to common Web-application attacks such as Cross Site Scripting and SQL injection. Industrialized countries were found to be more vulnerable than under-developed countries (90% vs. 50%). The paper also describes some malicious data mining possibilities on the Norwegian E-Government, and how information can be combined and used to create other practical attacks.
منابع مشابه
International Journal of Advance Research and Innovation
In today‘s world the explosive growth of the Internet has brought many good things such as E-commerce-banking, E-mail, Cloud Computing. Most organizations, governments are linked to the internet in some way or the other, but the question arises ̳how safe are they‘. There is also a Dark side to all the progress such as Hack-ing, creation of Backdoors, phishing etc.This paper elucidates in brief ...
متن کاملVulnerabilities of Government Websites in a Developing Country - the Case of Burkina Faso
Slowly, but consistently, the digital gap between developing and developed countries is being closed. Everyday, there are initiatives towards relying on ICT to simplify the interaction between citizens and their governments in developing countries. E-government is thus becoming a reality: in Burkina Faso, all government bodies are taking part in this movement with web portals dedicated to servi...
متن کاملVulnerability by Design in Mobile Network Security
The GSM network, commonly called 2G, was designed during the 1980s when the Cold War was still on. Due to political pressure from European governments, the security of GSM was deliberately made weak to allow easy interception by law enforcement agencies. Despite strengthened security in subsequent mobile network technologies of 3G and 4G, the weak security of 2G represents the ‘weakest link’ an...
متن کاملAlgebraic Matching of Vulnerabilities in a Low-Level Code
This paper explores the algebraic matching approach for detection of vulnerabilities in binary codes. The algebraic programming system is used for implementing this method. It is anticipated that models of vulnerabilities and programs to be verified are presented as behavior algebra and action language specifications. The methods of algebraic matching are based on rewriting rules and techniques...
متن کاملThe recognition of the necessity of for community-based disaster risk management to reduce the risk of vulnerability to earthquake disaster (case study: YousefAbad neighborhood of Tehran)
Disaster management and current attitudes in this area only focus on this areachr('39')s physical vulnerabilities, raising urban residentschr('39') exposure to these challenges in front of the earthquake. On the other hand, Incidental actions include reducing the vulnerability and the physical strengthening and promotion of poor organization during the disaster; they ignored the capabilities an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJESDF
دوره 1 شماره
صفحات -
تاریخ انتشار 2007