dc.description.abstract |
In many public organizations there have been reported some data attack incidents. These attacks
cause reputational damage, theft as well as financial losses. This problem has made public
organizations including adopting various cyber security practices to prevent data attacks. This
study assessed the effectiveness of cyber security practices on prevention of data attacks in
public organization a case of Tanzania Revenue Authority, Arusha regional office. Descriptive
survey research design and quantitative research approach was used. Stratified sampling
technique was used to select sample of 65. Data were collected through structured
questionnaires. Descriptive statistics such as mean and standard deviation was used to analyze
data. Validity and reliability of data collection tools was ensured. Findings revealed that TRA had
best existing cyber security practices. This is because the authority is responsible in gathering and
keeping sensitive data for the customers and government as well thus best cyber security
practices are essential for prevention of data attacks. The study further revealed that the user’s
awareness of cyber security practices on prevention of data attacks was high at TRA. Moreover,
the study shows that being custodian of sensitive data, Tanzania Revenue Authority, Arusha
regional office had adequate initiatives and strategies to prevent data from attacks. One of the
best practices to ensure data safety was through having technical support on cyber security
practices. The study recommends that due to the rapid changing of technology, Tanzania
Revenue Authority should prevent risks from various sources, including: internet-borne attacks,
such as spyware or malware, user-generated weaknesses such as easily guessed passwords or
misplaced information, inherent system or software flaws and vulnerabilities and subvert system
or software features. The study further recommends TRA should maintain its control access to
data and systems to make sure that individuals can only access data and services for which they
are authorized. The study further recommends TRA should ensure that they use up to date
software since the cyber-attacks happen because the systems or software are not fully up to date,
leaving weaknesses. So cybercriminals exploit these weaknesses to gain access to the network.
Once they are in it’s often too late to take preventative action. To counteract this, it is smart to
invest in a patch management system that will manage all software and system updates, keeping
the system resilient and up to date |
en_US |