An Analysis of Cybersecurity Policies and Practices in Public Administration
DOI:
https://doi.org/10.55885/jprsp.v2i2.211Keywords:
Cybersecurity, Policies, Practices, Public AdministrationAbstract
The purpose of this research was to assess the strengths and weaknesses of a public administration organization's hacking policies and practices. According to the findings, the company has a solid cybersecurity base thanks to its comprehensive policies and ongoing training and awareness programs. Nonetheless, there were also opportunities for development, such as in access controls and vulnerability evaluations. A more thorough cybersecurity policy, the use of role-based access control, and more frequent and thorough vulnerability assessments and penetration testing were among the best practices and improvement suggestions uncovered by the research. The company will be better able to safeguard sensitive data and prevent future attacks by implementing these suggestions. This research serves as a useful reminder of the significance of cybersecurity in public administration and emphasizes the need for constant vigilance and advancement in order to remain one step ahead of new threats.
References
Althunibat, A., Binsawad, M., Almaiah, M. A., Almomani, O., Alsaaidah, A., Al-Rahmi, W., & Seliaman, M. E. (2021). Sustainable applications of smart-government services: A model to understand smart-government adoption. Sustainability (Switzerland), 13(6). https://doi.org/10.3390/su13063028
Baena-Morales, S., Jerez-Mayorga, D., Delgado-Floody, P., & Martínez-Martínez, J. (2021). Sustainable development goals and physical education. A proposal for practice-based models. In International Journal of Environmental Research and Public Health (Vol. 18, Issue 4, pp. 1–18). MDPI AG. https://doi.org/10.3390/ijerph18042129
Chang, A. (Jasmine), El-Rayes, N., & Shi, J. (2022). Blockchain Technology for Supply Chain Management: A Comprehensive Review. FinTech, 1(2), 191–205. https://doi.org/10.3390/fintech1020015
Doran, N. M., Puiu, S., Bădîrcea, R. M., Pirtea, M. G., Doran, M. D., Ciobanu, G., & Mihit, L. D. (2023). E-Government Development—A Key Factor in Government Administration Effectiveness in the European Union. Electronics (Switzerland), 12(3). https://doi.org/10.3390/electronics12030641
ElAlfy, A., Palaschuk, N., El-Bassiouny, D., Wilson, J., & Weber, O. (2020). Scoping the evolution of corporate social responsibility (CSR) research in the sustainable development goals (SDGS) era. In Sustainability (Switzerland) (Vol. 12, Issue 14). MDPI. https://doi.org/10.3390/su12145544
Georgiadou, A., Michalitsi-Psarrou, A., Gioulekas, F., Stamatiadis, E., Tzikas, A., Gounaris, K., Doukas, G., Ntanos, C., Ribeiro, L. L., & Askounis, D. (2021). Hospitals’ cybersecurity culture during the COVID-19 crisis. Healthcare (Switzerland), 9(10). https://doi.org/10.3390/healthcare9101335
Jin, Q., Raza, S. H., Yousaf, M., Zaman, U., & Siang, J. M. L. D. (2021). Can communication strategies combat covid-19 vaccine hesitancy with trade-off between public service messages and public skepticism? Experimental evidence from Pakistan. Vaccines, 9(7). https://doi.org/10.3390/vaccines9070757
Perera, S., Jin, X., Maurushat, A., & Opoku, D. G. J. (2022). Factors Affecting Reputational Damage to Organisations Due to Cyberattacks. Informatics, 9(1). https://doi.org/10.3390/informatics9010028
Srebalová, M., & Peráček, T. (2022). Effective Public Administration as a Tool for Building Smart Cities: The Experience of the Slovak Republic. Laws, 11(5). https://doi.org/10.3390/laws11050067
Triplett, W. J. (2022). Addressing Human Factors in Cybersecurity Leadership. Journal of Cybersecurity and Privacy, 2(3), 573–586. https://doi.org/10.3390/jcp2030029
Wang, C.-N., Yang, F.-C., Vo, N. T. M., & Nguyen, V. T. T. (2022). Wireless Communications for Data Security: Efficiency Assessment of Cybersecurity Industry—A Promising Application for UAVs. Drones, 6(11), 363. https://doi.org/10.3390/drones6110363
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Journal of Public Representative and Society Provision
![Creative Commons License](http://i.creativecommons.org/l/by-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.