{"title":"An Analysis of Cybersecurity Policies and Practices in Public Administration","authors":"Aulia Ramdhani Arief","doi":"10.55885/jprsp.v2i2.211","DOIUrl":null,"url":null,"abstract":"The purpose of this research was to assess the strengths and weaknesses of a public administration organization's hacking policies and practices. According to the findings, the company has a solid cybersecurity base thanks to its comprehensive policies and ongoing training and awareness programs. Nonetheless, there were also opportunities for development, such as in access controls and vulnerability evaluations. A more thorough cybersecurity policy, the use of role-based access control, and more frequent and thorough vulnerability assessments and penetration testing were among the best practices and improvement suggestions uncovered by the research. The company will be better able to safeguard sensitive data and prevent future attacks by implementing these suggestions. This research serves as a useful reminder of the significance of cybersecurity in public administration and emphasizes the need for constant vigilance and advancement in order to remain one step ahead of new threats.","PeriodicalId":349564,"journal":{"name":"Journal of Public Representative and Society Provision","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Public Representative and Society Provision","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.55885/jprsp.v2i2.211","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The purpose of this research was to assess the strengths and weaknesses of a public administration organization's hacking policies and practices. According to the findings, the company has a solid cybersecurity base thanks to its comprehensive policies and ongoing training and awareness programs. Nonetheless, there were also opportunities for development, such as in access controls and vulnerability evaluations. A more thorough cybersecurity policy, the use of role-based access control, and more frequent and thorough vulnerability assessments and penetration testing were among the best practices and improvement suggestions uncovered by the research. The company will be better able to safeguard sensitive data and prevent future attacks by implementing these suggestions. This research serves as a useful reminder of the significance of cybersecurity in public administration and emphasizes the need for constant vigilance and advancement in order to remain one step ahead of new threats.