IAA Digital Repository

Effectiveness of Cyber Security Practices on Prevention of Data Attacks in Public Organizations:

Show simple item record

dc.contributor.author SARUMAA, Athuman. Y
dc.date.accessioned 2024-07-25T08:02:11Z
dc.date.available 2024-07-25T08:02:11Z
dc.date.issued 2023
dc.identifier.uri http://dspace.iaa.ac.tz:8080/xmlui/handle/123456789/2540
dc.description Supervisor..ABDUEL, Mishael. E en_US
dc.description.abstract In many public organizations there have been reported some data attack incidents. These attacks cause reputational damage, theft as well as financial losses. This problem has made public organizations including adopting various cyber security practices to prevent data attacks. This study assessed the effectiveness of cyber security practices on prevention of data attacks in public organization a case of Tanzania Revenue Authority, Arusha regional office. Descriptive survey research design and quantitative research approach was used. Stratified sampling technique was used to select sample of 65. Data were collected through structured questionnaires. Descriptive statistics such as mean and standard deviation was used to analyze data. Validity and reliability of data collection tools was ensured. Findings revealed that TRA had best existing cyber security practices. This is because the authority is responsible in gathering and keeping sensitive data for the customers and government as well thus best cyber security practices are essential for prevention of data attacks. The study further revealed that the user’s awareness of cyber security practices on prevention of data attacks was high at TRA. Moreover, the study shows that being custodian of sensitive data, Tanzania Revenue Authority, Arusha regional office had adequate initiatives and strategies to prevent data from attacks. One of the best practices to ensure data safety was through having technical support on cyber security practices. The study recommends that due to the rapid changing of technology, Tanzania Revenue Authority should prevent risks from various sources, including: internet-borne attacks, such as spyware or malware, user-generated weaknesses such as easily guessed passwords or misplaced information, inherent system or software flaws and vulnerabilities and subvert system or software features. The study further recommends TRA should maintain its control access to data and systems to make sure that individuals can only access data and services for which they are authorized. The study further recommends TRA should ensure that they use up to date software since the cyber-attacks happen because the systems or software are not fully up to date, leaving weaknesses. So cybercriminals exploit these weaknesses to gain access to the network. Once they are in it’s often too late to take preventative action. To counteract this, it is smart to invest in a patch management system that will manage all software and system updates, keeping the system resilient and up to date en_US
dc.language.iso en_US en_US
dc.publisher IAA en_US
dc.subject CYBER SECURITY, DATA ATTACKS en_US
dc.title Effectiveness of Cyber Security Practices on Prevention of Data Attacks in Public Organizations: en_US
dc.title.alternative A case of Tanzania revenue authority, Arusha regional office en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account