EVALUATING CYBERSECURITY THREATS, MEASURES, AND EFFECTIVE FACTORS FOR ENHANCING THE SECURITY OF KENYA'S ECITIZEN PLATFORM
Abstract
This research explored the cybersecurity environment of Kenya's eCitizen platform, a crucial tool for accessing government services in the face of rising global cyber threats. The study focused on protecting sensitive governmental data, with objectives that included analyzing cybersecurity threats, evaluating mitigation strategies, and providing actionable recommendations. The literature review thoroughly examined each objective through the lens of established cybersecurity models such as Defense in Depth, Zero Trust, and the Integrated Theory of Cybercrimes. These models offered proactive strategies and comprehensive frameworks for strengthening cybersecurity defenses. In terms of methodology, the research utilized a descriptive research design with a case study approach and stratified sampling technique to systematically investigate cybersecurity threats and management strategies specific to the eCitizen platform. This approach enabled a detailed examination of the unique challenges and solutions related to cybersecurity within this context. The analysis incorporated regression analysis to quantify the relationships between cybersecurity threats, mitigation measures, and the effectiveness of these measures in enhancing the security of the eCitizen platform. The regression model revealed that predictors such as cybersecurity threats, security measures, and effectiveness factors are significantly correlated with the platform’s security effectiveness. This statistical analysis highlighted key areas where improvements could be made and provided a data-driven basis for recommendations. The discussion critically evaluated the impact of cybersecurity threats and digitalization trends in Kenya, addressing issues such as demographic factors, challenges in managing cyber threats, and the perceived effectiveness of various security measures. The conclusions emphasized the need for improved governance, enhanced risk management practices, updated legislation, and increased international cooperation to address evolving cyber threats effectively. The study also recommended further research to align with global cybersecurity best practices, aiming to enhance resilience and public trust in online government services. Overall, this research contributed significantly to understanding the cybersecurity challenges faced by Kenya’s government services, advocating for proactive measures, transparent communication, and collaborative efforts across sectors to improve security and public confidence in digital services.
References
Brown, T. (2021). The Escalation of DDoS Attacks on Government Websites. Internet Security Review, 11(4), 78-92.
Cremer, F., Sheehan, B., Fortmann, M., Kia, A. N., Mullins, M., Murphy, F., & Materne, S. (2022). Cyber risk and cybersecurity: a systematic review of data availability. The Geneva papers on risk and insurance. Issues and practice, 47(3), 698–736. https://doi.org/10.1057/s41288-022-00266-6
Denning, D. E. (2019). Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy. Networks and netwars: The future of terror, crime, and militancy, 239, 288.
Ecclesiastical. (2020). Cyber threats explained: UK Education Sector. 1–16.
Goode, L. (2018). Anonymous and the political ethos of hacktivism. In Popular Communication, Piracy and Social Change (pp. 99-112). Routledge.
Goudy, K. (2015). No Title. March.
Mahlangu, G., & Ruhode, E. (2021). Factors Enhancing E-Government Service Gaps in a Developing Country Context. 422–440. http://arxiv.org/abs/2108.09803
Suleiman, M. M., Anas, A. A., Adamu, I., & Adam, S. M. (2020). Prevention & Detection Measures Against Cybercrimes Attack Department of Home & Rural Economics Department of Establishment , Central Administration School of Rural Technology and Entrepreneurship Development , Rano . Being A Paper To Be Presented At Its. International Research Initiative Conference, 1(Kumar 2010), 13. https://www.academia.edu/44547837/Prevention_and_Detection_Measures_Against_Cybercrimes_Attack
Świątkowska, J. (2020). Tackling cybercrime to unleash developing countries ’ digital potential. 45. https://pathwayscommission.bsg.ox.ac.uk/sites/default/files/2020-01/tackling_cybercrime_to_unleash_developing_countries_digital_potential.pdf