Kaimosi Friends University College Repository

Cyber-Security Vulnerability Assessment Model for County Governments in Kenya

Show simple item record

dc.contributor.author Mbugua, Samuel
dc.contributor.author Chitechi, Kadima Victor
dc.contributor.author Omieno, Kelvin K
dc.date.accessioned 2021-08-31T07:06:30Z
dc.date.available 2021-08-31T07:06:30Z
dc.date.issued 2021-07
dc.identifier.citation [1] Atul M. Tonge1, S. S. (2013). Cyber security:challenges for society-literature review. IOSR Journal of Computer Engineering (IOSR-JCE)e-ISSN: 2278-0661, p-ISSN: 2278-8727Volume 12, Issue 2(May. -Jun. 2013), PP 67-75 www.iosrjournals.orgwww.iosrjournals.org 2278-0661, p-ISSN: 2278-8727Volume 12, Issue 2(May. -Jun. 2, 67-75. [2] Benini, A. P. (2017, August). The Use of Expert Judgment in Humanitarian Analysis Theory, Methods,Applications. Geneva, Assessment Capacities Project - ACAPS. [3] Blair, A. D. (2009). Annual Threat Assessment. House Permanent Select Committee on Intelligence, . [4] Boyce, M. (2015). Human Performance in Cybersecurity. Proceedings of the Human Factors and Ergonomics Society 55th Annual Meeting (pp. 1002-1006). Las Vegas, Nevada USA.: HFES-Human Factors and Ergonomics Society. [5] Chelanga, M. (2014, August Wednesday). Cyber-criminals Hack Government of Kenya At Will and the State is Helpless. Retrieved from Eastafrican Standard: http://ilaw.co.ke/tech-and-innovation/cyber-criminals-hack-government-of-kenya-at-will-and-the-state-is-helpless/#.WQiaesb-vIU [6] Clark, A. &. (2016, june 07). Proceedings of a Workshop on Deterring Cyber Attacks. Cyber Security and International Agreements ,Internet Corporation for Assigned Names and Numbers, pp. 185-205. [7] Cresswell, J. (2014). Research Design Qualitative, Quantitative and Mixed Methods Approaches 4th Edition. In C. J.W, Research Design. Canada: Canadian Center of Science and Education. Paper ID: SR21714030154 DOI: 10.21275/SR21714030154 796 International Journal of Science and Research (IJSR) ISSN: 2319-7064 SJIF (2020): 7.803 Volume 10 Issue 7, July 2021 www.ijsr.net Licensed Under Creative Commons Attribution CC BY [8] Cresswell, J. W. (2016). Planning , Conducting and Evaluating Qualitative and Quantitative Research. London: Pearson Education Inc. [9] Green, L. A. (2015). Purposeful Sampling for Qualitative Data Collection and Analysis in Mixed Method Implementation Research. Administration and Policy in Mental Health and Mental Health Services Research, September 2015, Volume 42, Issue 5, pp 533–544, 533-544. [10] Ilker Etikan, S. A. (2016). Comparison of Convenience Sampling and Purposive Sampling. American Journal of Theoretical and Applied Statistics,Published online December 22, 2015 (http://www.sciencepublishinggroup.com/j/ajtas) doi: 10.11648/j.ajtas.20160501.11, 1-4. [11] Jean-Paul A. Yaacoub, a. O. (2020). Cyber-physical systems security: Limitations, issues and future trends. Elsevier Public Health Emergency Collection-Published online 2020 Jul 8. doi: 10.1016/j.micpro.2020.103201. [12] Jingguo. (2010). An Investigation of Network Attacks and Vulnerability. ACM Transactionson Management, Information Systems. [13] Julian Jang-Jaccard, S. N. (2018). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences-Volume 80, Issue 5, August 2014, Pages 973-993-https://doi.org/10.1016/j.jcss.2014.02.005, 973-993. [14] Knave, C. (2009). Cyber security effectively negating further use. IEEE, 20 - 24. [15] Kothari, C. (2010). Research Methodology: Methods and Techniques. Mumbai: New Age International publishers. . [16] Michael Boyce, &. K. (2015). Human Performance in Cybersecurity. Proceedings of the Human Factors and Ergonomics Society 55th Annual Meeting (pp. 1002-1006). Las Vegas, Nevada USA: HFES-Human Factors and Ergonomics Society. [17] Mohamed Abomhara & Geir M. Køien. (2015). Cyber Security and the Internet ofThings:Vulnerabilities,Threats, Intruders and Attacks. Journal of Cyber Security, Vol. 4, 65–88-doi: 10.13052/jcsm2245-1439.414 , 65-88. [18] Murithi & Mwinzi. (2016). he Influence of Financial Resources on the integration of the National Goals of Education. International Journal of Education and Research. [19] Murithi Tiberious, M. J. (2016). The Influence of Financial Resources on the integration of the National Goals of Education . International Journal of Education and ResearchVol. 4 No. 9 September2016. [20] Neetesh Saxena, E. H. (2020). Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses. MDPI Electronics Open Acess Journal . [21] Nepal, J. J. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences,Volume 80, Issue 5, August 2014, Pages 973-993, 973-993. [22] Paula Kigen, C. K. (2014). KENYA CYBER SECURITY REPORT 2014 Rethinking Cyber Security –An Integrated Approach: Processes, Intelligence and Monitoring. Nairobi: Serianu Limited. [23] Pressman, R. S. (2004). Software Engineering: A Practitioner's Approach: 6th (Sixth) Edition. ISA: McGraw-Hill Companies, The (March 24, 2004). [24] RegDennick, M. T. (2011). Making sense of Cronbach’s alpha. International Journal of Medical Education. 2011; 2:53-55 , ISSN: 2042-6372 DOI: 10.5116/ijme.4dfb.8dfd, 53-55 . [25] Rossouwvon Solms & Johanvan Niekerk. (2013). From information security to cyber security. Volume 38, October 2013, Pages 97-102 -https://doi.org/10.1016/j.cose.2013.04.004, 97-102. [26] Saunders, M. (2009). Ethics in Research. London: Pearson Education. [27] Suraj, A. &. (2013, may). Cyber security: challenges for society- literature review. IOSR Journal of Computer Engineering (IOSR-JCE), pp. 67-75. [28] Thomas W. Edgar, D. O. (2017). Science and Cyber Security in Research Methods for Cyber Securit. In D. O. Thomas W. Edgar, Research Methods for Cyber Security (pp. 393-404). Elsevier B.V. . [29] Wang, P. &. (2010). The deterrent and displacement effects of information security enforcement. International evidence. J. Manag. Inf. Syst., 125–144. en_US
dc.identifier.issn 2319-7064
dc.identifier.uri http://erepository.kafuco.ac.ke/123456789/94
dc.description.abstract Computerization of county government daily activities enables faster and better services to their clients. The integration of Information and Communications Technology by the CG into their systems has led to new advancements in technology. The adoption of ICT into the Kenya’s County Governments has contributed to faster growth and output in better client service delivery. The benefits has also encouraged serious attacks to such systems causing risks due to easier penetration in the systems because of vulnerabilities. The attacks have costed county governments more resources and time in case of managing such risks. As a country, we need to ensure that all our systems are well safeguarded from attacks. This paper sought to address the above issue by developing a cyber-security vulnerability assessment model for County Governments in Kenya, The model can be applied as a better approach that will manage and reduce the attacks and risks. The Model was developed from a study that targeted a total population of 170 staff grouped as end users and ICT Experts working in county governments of Kakamega and Bungoma. The study adopted an exploratory research design. Stratified random sampling technique was used to group the counties while purposive sampling was used to identify the correspondence with the required information. A sample size of 98 end users and 37 ICT experts was obtained using Yamane’s formula. Questionnaires and interview schedules were used in data collection. The data was analyzed using SPSS where descriptive statistics of frequencies, charts, percentages and mean regression analysis were used and a null hypothesis was tested at 5% level of significance. Study results showed that there is a positive association between preparedness and awareness, support and funding, policies and regulations, and technology; hence influencing cyber-security. The developed model will be used as a guide to manage cyber security matters in Kenya’s County governments. en_US
dc.language.iso en en_US
dc.publisher International Journal of Science and Research en_US
dc.subject Cyber-Security, Cyber-Attacks, Vulnerability, Assessment Model, Model, County Governments en_US
dc.title Cyber-Security Vulnerability Assessment Model for County Governments in Kenya en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Erepository


Browse

My Account