International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 2 | Views: 136

Research Paper | Computer Science and Information Technology | Kenya | Volume 10 Issue 7, July 2021 | Popularity: 4.9 / 10


     

Cyber-Security Vulnerability Assessment Model for County Governments in Kenya

Kadima Victor Chitechi, Kelvin K. Omieno, Samuel Mbugua


Abstract: Computerization of county government daily activities enables faster and better services to their clients. The integration of Information and Communications Technology by the CG into their systems has led to new advancements in technology. The adoption of ICT into the Kenya?s County Governments has contributed to faster growth and output in better client service delivery. The benefits has also encouraged serious attacks to such systems causing risks due to easier penetration in the systems because of vulnerabilities. The attacks have costed county governments more resources and time in case of managing such risks. As a country, we need to ensure that all our systems are well safeguarded from attacks. This paper sought to address the above issue bydeveloping a cyber-security vulnerability assessment model for County Governments in Kenya, The model can be applied as a better approach that will manage and reduce the attacks and risks. The Model was developed from a study that targeted a total population of 170 staff grouped as end users and ICT Experts working in county governments of Kakamega and Bungoma. The study adopted an exploratory research design. Stratified random sampling technique was used to group the counties while purposive sampling was used to identify the correspondence with the required information. A sample size of 98 end users and 37 ICT experts was obtained using Yamane?s formula. Questionnaires and interview schedules were used in data collection. The data was analyzed using SPSS where descriptive statistics of frequencies, charts, percentages and mean regression analysis were used and a null hypothesis was tested at 5% level of significance. Study results showed that there is a positive association between preparedness and awareness, support and funding, policies and regulations, and technology; hence influencing cyber-security. The developed model will be used as a guide to manage cyber security matters in Kenya?s County governments.


Keywords: Cyber-Security, Cyber-Attacks, Vulnerability, Assessment Model, Model, County Governments


Edition: Volume 10 Issue 7, July 2021


Pages: 792 - 797



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Kadima Victor Chitechi, Kelvin K. Omieno, Samuel Mbugua, "Cyber-Security Vulnerability Assessment Model for County Governments in Kenya", International Journal of Science and Research (IJSR), Volume 10 Issue 7, July 2021, pp. 792-797, URL: https://www.ijsr.net/getabstract.php?paperid=SR21714030154, DOI: https://www.doi.org/10.21275/SR21714030154



Downloads: 180 | Views: 326

Computer Science and Information Technology, India, Volume 9 Issue 4, April 2020

Pages: 187 - 189

Wearable Forensic Traces and Security Challenges

Divya Premchandran


Downloads: 180 | Views: 386

Computer Science and Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1296 - 1299

Quantum Computing

Shaifali Rastogi


Downloads: 177 | Views: 350

Computer Science and Information Technology, India, Volume 9 Issue 8, August 2020

Pages: 618 - 621

Recognition of Vehicle by Number Plate by Automatic Number Plate Recognition System

Maruthi ST, Dr. Sanjay Pande MB, Bindhu K M, Divya I, Gauri N S, Megha V


Downloads: 156 | Views: 314

Computer Science and Information Technology, United States of America, Volume 9 Issue 3, March 2020

Pages: 1177 - 1179

IT Infrastructure Business Contingency Plan

Anshuman Awasthi


Downloads: 152 | Views: 342

Computer Science and Information Technology, China, Volume 9 Issue 3, March 2020

Pages: 519 - 528

Sparse Representation of Image with Immune Clone Algorithm based on Harmonic Wavelet Packet Dictionary

WANG Li, WANG Wei, LIU Boni


Top