ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

An Investigation on Issues and Challenges of Information System Security and Its Cryptographic Techniques: A Case Study of Tanzania Revenue Authority Dar Es Salaam

Journal: International Journal of Scientific Engineering and Science (Vol.2, No. 4)

Publication Date:

Authors : ;

Page : 40-49

Keywords : Challenges; Confidentiality; Cryptographic; Information; information System; Integrity; Intrusion Detection System (IDS); Issues; Privacy; Protocals; investigation; Security.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The purpose of the study was to examine the challenges of the information system security and its cryptographic techniques at Tanzania revenue authority. Objectives of the study were; to identify techniques that can be used to secure information systems in organizations, to examine the challenges faced by Tanzania revenue authority in ensuring the security of their information systems and to determine the level of information system security of TRA based on the CIA triangle. The research design used was descriptive cross sectional survey. The study covered the total population of 36 staffs which was purposively sampled from Tanzania revenue Authority employees. Research instrument used was Questionnaire which made it easy to gather data from the field and collect information from the field of study. Data analysis was done with help of (SPSS) Statistical Package for Social Science which was used during data manipulation. Findings showed that TRA is using most of the important cryptographic techniques to secure information systems but still are faced by information system security challenges like most system users misuse the system and some users share their usernames and passwords which seems to be serious challenges that may cause occurrence on the system security. It was recommended that the TRA IT administration is required to increase effort in the process of identifying new challenge so as to employ new techniques in the process of securing information systems. Also the IT administration should regulate the system users as they are the main sources of the challenges faced within the organization.

Last modified: 2018-05-17 23:29:03