EVALUATING CYBERSECURITY THREATS, MEASURES, AND EFFECTIVE FACTORS FOR ENHANCING THE SECURITY OF KENYA'S ECITIZEN PLATFORM

  • JENNIFER CHEBET SITIENEI Master of Arts in Security Management and Police Studies, School of Law, Arts and Social Sciences, Kenyatta University, Kenya
  • JOHN KANDIRI, PhD Senior Lecturer, Department of Computing and Information Science, Kenyatta University, Kenya
Keywords: System Security, Cyber Attack, Digitization, E-citizen, Kenya

Abstract

This research explored the cybersecurity environment of Kenya's eCitizen platform, a crucial tool for accessing government services in the face of rising global cyber threats. The study focused on protecting sensitive governmental data, with objectives that included analyzing cybersecurity threats, evaluating mitigation strategies, and providing actionable recommendations. The literature review thoroughly examined each objective through the lens of established cybersecurity models such as Defense in Depth, Zero Trust, and the Integrated Theory of Cybercrimes. These models offered proactive strategies and comprehensive frameworks for strengthening cybersecurity defenses. In terms of methodology, the research utilized a descriptive research design with a case study approach and stratified sampling technique to systematically investigate cybersecurity threats and management strategies specific to the eCitizen platform. This approach enabled a detailed examination of the unique challenges and solutions related to cybersecurity within this context. The analysis incorporated regression analysis to quantify the relationships between cybersecurity threats, mitigation measures, and the effectiveness of these measures in enhancing the security of the eCitizen platform. The regression model revealed that predictors such as cybersecurity threats, security measures, and effectiveness factors are significantly correlated with the platform’s security effectiveness. This statistical analysis highlighted key areas where improvements could be made and provided a data-driven basis for recommendations. The discussion critically evaluated the impact of cybersecurity threats and digitalization trends in Kenya, addressing issues such as demographic factors, challenges in managing cyber threats, and the perceived effectiveness of various security measures. The conclusions emphasized the need for improved governance, enhanced risk management practices, updated legislation, and increased international cooperation to address evolving cyber threats effectively. The study also recommended further research to align with global cybersecurity best practices, aiming to enhance resilience and public trust in online government services. Overall, this research contributed significantly to understanding the cybersecurity challenges faced by Kenya’s government services, advocating for proactive measures, transparent communication, and collaborative efforts across sectors to improve security and public confidence in digital services.

Author Biographies

JENNIFER CHEBET SITIENEI, Master of Arts in Security Management and Police Studies, School of Law, Arts and Social Sciences, Kenyatta University, Kenya

Master of Arts in Security Management and Police Studies, School of Law, Arts and Social Sciences, Kenyatta University, Kenya

JOHN KANDIRI, PhD, Senior Lecturer, Department of Computing and Information Science, Kenyatta University, Kenya

Senior Lecturer, Department of Computing and Information Science, Kenyatta University, Kenya

References

Brown, A., Gibson, M., & Short, E. (2017). Annual Review of Cybertherapy and Telemedicine.

Brown, T. (2021). The Escalation of DDoS Attacks on Government Websites.           Internet            Security    Review, 11(4), 78-92.

Cremer, F., Sheehan, B., Fortmann, M., Kia, A. N., Mullins, M., Murphy, F., & Materne, S. (2022). Cyber risk and cybersecurity: a systematic review of data availability. The Geneva papers on risk and insurance. Issues and practice, 47(3), 698–736. https://doi.org/10.1057/s41288-022-00266-6

Denning, D. E. (2019). Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy. Networks and netwars: The future          of terror, crime, and militancy, 239, 288.

Ecclesiastical. (2020). Cyber threats explained: UK Education Sector. 1–16.

Goode, L. (2018). Anonymous and the political ethos of hacktivism. In Popular Communication, Piracy and Social Change (pp. 99-112). Routledge.

Goudy, K. (2015). No Title. March.

Mahlangu, G., & Ruhode, E. (2021). Factors Enhancing E-Government Service Gaps in a Developing Country Context. 422–440. http://arxiv.org/abs/2108.09803

Suleiman, M. M., Anas, A. A., Adamu, I., & Adam, S. M. (2020). Prevention & Detection Measures Against Cybercrimes Attack Department of Home & Rural Economics Department of Establishment , Central Administration School of Rural Technology and Entrepreneurship Development , Rano . Being A Paper To Be Presented At Its. International Research Initiative Conference, 1(Kumar 2010), 13. https://www.academia.edu/44547837/Prevention_and_Detection_Measures_Against_Cybercrimes_Attack

Świątkowska, J. (2020). Tackling cybercrime to unleash developing countries ’ digital potential. 45. https://pathwayscommission.bsg.ox.ac.uk/sites/default/files/2020-01/tackling_cybercrime_to_unleash_developing_countries_digital_potential.pdf
Published
2024-10-10
Section
Articles