An Investigation on Issues and Challenges of Information System Security and Its Cryptographic Techniques: A Case Study of Tanzania Revenue Authority Dar Es Salaam
Journal: International Journal of Scientific Engineering and Science (Vol.2, No. 4)Publication Date: 2018-05-15
Authors : Edward Onyango Orinda Alex Zakaria Ndaba;
Page : 40-49
Keywords : Challenges; Confidentiality; Cryptographic; Information; information System; Integrity; Intrusion Detection System (IDS); Issues; Privacy; Protocals; investigation; Security.;
Abstract
The purpose of the study was to examine the challenges of the information system security and its cryptographic techniques at Tanzania revenue authority. Objectives of the study were; to identify techniques that can be used to secure information systems in organizations, to examine the challenges faced by Tanzania revenue authority in ensuring the security of their information systems and to determine the level of information system security of TRA based on the CIA triangle. The research design used was descriptive cross sectional survey. The study covered the total population of 36 staffs which was purposively sampled from Tanzania revenue Authority employees. Research instrument used was Questionnaire which made it easy to gather data from the field and collect information from the field of study. Data analysis was done with help of (SPSS) Statistical Package for Social Science which was used during data manipulation. Findings showed that TRA is using most of the important cryptographic techniques to secure information systems but still are faced by information system security challenges like most system users misuse the system and some users share their usernames and passwords which seems to be serious challenges that may cause occurrence on the system security. It was recommended that the TRA IT administration is required to increase effort in the process of identifying new challenge so as to employ new techniques in the process of securing information systems. Also the IT administration should regulate the system users as they are the main sources of the challenges faced within the organization.
Other Latest Articles
- Legal Aid Arrangement for Police and Police Family in Indonesia
- Performance assessment of neuro fuzzy based image fusion of satellite images
- Doctrine of Non Expropriation as Legal Protection Solutions for Minority Shareholders in Merger Limited Liability Company
- The Independence of Financial Services Authority Role in Regulating and Supervising Banking Credit Agreement Protecting the Parties
- Survey on Overall Health Conditions of University Students in Dhaka
Last modified: 2018-05-17 23:29:03