Abstract:
E-government applications are developed under ICT to serve citizens and other stakeholders with all governmental services electronically. All nations strive to deploy E-government in an effective and efficient way. E-government security is considered one of the crucial factors for achieving an advanced stage of e-government. As the number of e-government services introduced to the user increases, a higher level of e-government security is required. However, threats and risks are increased as will. Attackers explore and exploit the vulnerabilities found in Internet platform application, then seek holes for falsification, forged and spoofed identity, hence most of security issues to gain access of protected systems.
The research conducted a mix-method systematic qualitative and quantitative research, A case study strategy is conducted to find facts that can assist Sudan e-government initiatives for best citizen’s adoption, case study findings assist in developing the proposed solution.
This work proposed a framework to develop a secure communication in E-government for authentication on the application layer. The solution will serve to provide trusteeship through insure and verify the identity of stakeholders who use governmental electronic services, this research propose an authentication framework in an appropriate approach to secure e-government, where this approach might need to encompasses multi-model of security to work in efficient security environment, that compromises both of technical and non-technical issues and to be applied.
This research contribute to empirical and theoretical knowledge, where the research study the weakness in e-government environment, and implement a model to secure login for the most sensitive Internet-based e-government services, this is done using a hybrid biometric fingerprint and digital signature, to tight accessibility to e-government and provide security in depth strategy. The model is testing using penetration testing which yield a positive results against the major types of web application attacks.