Abstract

The Higher Education Institutions (HEIs) in India enhanced dependency on Information Communication Technology (ICT) based on G2C eGovernance applications persistently raised apprehension regarding cyber-attacks and breach of security. Objectives:The present study assesses the status of ambiguity and vulnerability pertaining to security aspects of HEIs G2C eGovernance web portals. Methods:Five prominent central and state HEIs i.e. Malaviya National Institute of Technology - Jaipur (MNIT), National Institute of Technology - Kurukshetra (NITK), Guru Nanak Dev University -Amritsar (GNDU), Maharshi Dayanand University – Rohtak (MDU), and Bhagat Phool Singh Mahila Vishwavidyalaya – Sonipat (BPSMV) were included in the study and Grey Box penetration testing method through open-source software’s Whois.sc, Yougetsignal.com, Kali Linux, Builtwith.com, NMAP, and Google Hacking Database (GHDB), etc. along with social engineering testing through external penetration strategy was applied to assess the ambiguity and vulnerability of HEIs. Findings:The analysis revealed that login IDs and passwords related to web portals, eResources, networks, etc. are freely available and shared without any authorization which is a major cause of security breach. The vulnerability test depicted unencrypted communication between the HEIs portals and servers and the absence of well-articulated security and privacy. Novelty: The study exhibits the lenient view of HEIs administration towards security aspects of G2C eGovernance projects and the outcome would enable the HEIs of India to develop a comprehensive security policy for enriching and securing the G2C eGovernance System. Keywords: eGovernance; security; ambiguity; vulnerability; privacy policy; social engineering testing

Highlights

  • The conception of eGovernance is barely few decades old but its significance is well evident the way G2C eGovernance applications facilitate government processes expeditiously and with enhanced transparency and accountability to evolve https://www.indjst.org/Gill & Vij / Indian Journal of Science and Technology 2020;13(34):3515–3520 into eSociety

  • Findings:The analysis revealed that login IDs and passwords related to web portals, eResources, networks, etc. are freely available and shared without any authorization which is a major cause of security breach

  • It was exposed that the Guru Nanak Dev University -Amritsar (GNDU), Malaviya National Institute of Technology - Jaipur (MNIT), and National Institute of Technology - Kurukshetra (NITK) web portal hosted on a dedicated server whereas in case of the Bhagat Phool Singh Mahila Vishwavidyalaya – Sonipat (BPSMV)

Read more

Summary

Introduction

The conception of eGovernance is barely few decades old but its significance is well evident the way G2C eGovernance applications facilitate government processes expeditiously and with enhanced transparency and accountability to evolve https://www.indjst.org/Gill & Vij / Indian Journal of Science and Technology 2020;13(34):3515–3520 into eSociety. Research outcomes endorse the use of ICTs and Web2.0 as a means of supporting Planning, eSociety, and eParticipation (1). Gov2.0, as a strategic digital facilitator supports, the establishments to empower and enhance the citizen participation digitally (2). Nations across the globe are determined towards the transformation of governance into eGovernance, to enhance connect with citizens to understand the real needs and works for the welfare of the society and to empower the citizens to participate actively in policy making and implementation. The issue related to secure transactions in G2C eGovernance always remains crucial (3). Cloud computing evolved as web-based technology work in collaborations with various channel partners support facilities viz. The use of RSA based multi-server authenticated common login credential to access diverse G2C eGovernance services offered by various government agencies is proposed (7) articulating consensus between diverse government agencies operating at national, state and district level is a challenging task and social and political factors play a considerable role in it

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.