A worldwide overview on the information security posture of online
public services
- URL: http://arxiv.org/abs/2310.01200v1
- Date: Mon, 2 Oct 2023 13:40:18 GMT
- Title: A worldwide overview on the information security posture of online
public services
- Authors: Jo\~ao Marco Silva, Diogo Ribeiro, Luis Felipe Ramos and V\'itor Fonte
- Abstract summary: This work assesses the security posture of online platforms hosted in 3068 governmental domain names across all UN Member States.
Despite its rapid development, the public sector still falls short in adopting international standards and best security practices in services and infrastructure management.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The availability of public services through online platforms has improved the
coverage and efficiency of essential services provided to citizens worldwide.
These services also promote transparency and foster citizen participation in
government processes. However, the increased online presence also exposes
sensitive data exchanged between citizens and service providers to a wider
range of security threats. Therefore, ensuring the security and trustworthiness
of online services is crucial to Electronic Government (EGOV) initiatives'
success. Hence, this work assesses the security posture of online platforms
hosted in 3068 governmental domain names, across all UN Member States, in three
dimensions: support for secure communication protocols; the trustworthiness of
their digital certificate chains; and services' exposure to known
vulnerabilities. The results indicate that despite its rapid development, the
public sector still falls short in adopting international standards and best
security practices in services and infrastructure management. This reality
poses significant risks to citizens and services across all regions and income
levels.
Related papers
- Trustworthy Federated Learning: Privacy, Security, and Beyond [37.495790989584584]
Federated Learning (FL) addresses concerns by facilitating collaborative model training across distributed data sources without transferring raw data.
We conduct an extensive survey of the security and privacy issues prevalent in FL, underscoring the vulnerability of communication links and the potential for cyber threats.
We identify the intricate security challenges that arise within the FL frameworks, aiming to contribute to the development of secure and efficient FL systems.
arXiv Detail & Related papers (2024-11-03T14:18:01Z) - Smart-optimism. Uncovering the Resilience of Romanian City Halls in Online Service Delivery [0.0]
This study assesses the adaptability of Romanian city halls to digitalization.
It uses 23 indicators for measuring e-service dissemination within local contexts.
The research reveals notable progress in the digital transformation of services over time.
arXiv Detail & Related papers (2024-10-19T19:52:13Z) - A Blockchain-Enhanced Framework for Privacy and Data Integrity in Crowdsourced Drone Services [0.6284464997330884]
We present an innovative framework that integrates consumer-grade drones into bushfire management, addressing both service improvement and data privacy concerns under Australia's Privacy Act 1988.
This system establishes a marketplace where bushfire management authorities, as data consumers, access critical information from drone operators, who serve as data providers.
The framework employs local differential privacy to safeguard the privacy of data providers from all system entities, ensuring compliance with privacy standards.
arXiv Detail & Related papers (2024-10-08T03:08:47Z) - "What Keeps People Secure is That They Met The Security Team": Deconstructing Drivers And Goals of Organizational Security Awareness [4.711430413139394]
Security awareness campaigns in organizations now collectively cost billions of dollars annually.
Despite this, the basis of what security awareness managers do and what decides this are unclear.
We identify that success in awareness management is fragile while having the potential to improve.
arXiv Detail & Related papers (2024-04-29T02:10:35Z) - Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks [55.340315838742015]
Negligence on the security of infotainment data communication in IoV networks can unintentionally open an easy access point for social engineering attacks.
In particular, we first classify data communication in the IoV network, examine the security focus of each data communication, and then develop a differentiated security architecture to provide security protection on a file-to-file basis.
arXiv Detail & Related papers (2024-03-29T12:01:31Z) - Secure Aggregation is Not Private Against Membership Inference Attacks [66.59892736942953]
We investigate the privacy implications of SecAgg in federated learning.
We show that SecAgg offers weak privacy against membership inference attacks even in a single training round.
Our findings underscore the imperative for additional privacy-enhancing mechanisms, such as noise injection.
arXiv Detail & Related papers (2024-03-26T15:07:58Z) - The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective [64.36680481458868]
Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network's edge.
This paper provides a survey of security and privacy in MEC from the perspective of Artificial Intelligence (AI)
We focus on new security and privacy issues, as well as potential solutions from the viewpoints of AI.
arXiv Detail & Related papers (2024-01-03T07:47:22Z) - White paper on cybersecurity in the healthcare sector. The HEIR solution [1.3717071154980571]
Patient data, including medical records and financial information, are at risk, potentially leading to identity theft and patient safety concerns.
The HEIR project offers a comprehensive cybersecurity approach, promoting security features from various regulatory frameworks.
These measures aim to enhance digital health security and protect sensitive patient data while facilitating secure data access and privacy-aware techniques.
arXiv Detail & Related papers (2023-10-16T07:27:57Z) - Identity Prove Limited Information Governance Policy against cyber
security persistent threats [0.0]
IDPL applies an information governance based on the ISO/IEC:2022 standard of security and optimum performance.
The company should ensure a right person, a real person, authenticating in real-time.
The company has in-house systems focused on all potential risks to client data and its information system assets.
arXiv Detail & Related papers (2023-09-05T10:00:10Z) - Blockchain-empowered Federated Learning for Healthcare Metaverses:
User-centric Incentive Mechanism with Optimal Data Freshness [66.3982155172418]
We first design a user-centric privacy-preserving framework based on decentralized Federated Learning (FL) for healthcare metaverses.
We then utilize Age of Information (AoI) as an effective data-freshness metric and propose an AoI-based contract theory model under Prospect Theory (PT) to motivate sensing data sharing.
arXiv Detail & Related papers (2023-07-29T12:54:03Z) - The Design and Implementation of a National AI Platform for Public
Healthcare in Italy: Implications for Semantics and Interoperability [62.997667081978825]
The Italian National Health Service is adopting Artificial Intelligence through its technical agencies.
Such a vast programme requires special care in formalising the knowledge domain.
Questions have been raised about the impact that AI could have on patients, practitioners, and health systems.
arXiv Detail & Related papers (2023-04-24T08:00:02Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.