Journal of Environmental Treatment Techniques
2020, Volume 8, Issue 2, Pages: 679-686
to the public services disruption. In a survey (7), it was stated
that 52% of respondents blame hackers as the biggest
culprits while in reality, it is done by the regular users of the
assets, who are the employees of the local government,
which accounts for 44%, and only 4% is actually done by
hackers. For example, (8) reported that the Bahamas Public
Treasury’s computer systems went offline when a water leak
damaged the servers hosting an e-government service.
Bahamas State Minister for Finance, Michael Halkitis, stated
that the incident was due to the leakage on the third floor of
the Treasury Building, which affected the second floor
where the servers were situated. No online services were
available for a few days, which severely impacted the daily
operations of the Public Treasury.
the public, and local government may face lawsuits from
citizens if sensitive data such as financial information is lost
or falls into the wrong hands and are used for blackmail,
phishing, or fraud. According to a survey (7), 53% of the
data loss is due to human errors and is done by the local
government’s IT team members, and only 11% is done by
hackers. In a report released by (10), a thief stole a computer
belonging to the Department of Veterans Affairs (VA) in
Maryland, United States, which contained unencrypted data
of 26.5 million veterans and service personnel such as name,
social security numbers, birth dates, and disability ratings.
The case was reported, and the stolen computer was
recovered later by the police. After forensic examination by
FBI, it was reported that no data had been compromised.
However, in 2009, VA was sued by five veterans on alleged
invasion of privacy lawsuit and reached an agreement to pay
them $20 million for identity theft risk.
Physical
Asset Loss
2
.4 Data Breaches
Intellectual
A data breach is a situation where data is copied,
Compliance
Theft
transmitted, viewed, stolen, or used by an unauthorized
individual through phishing or human mistakes. It may occur
due to lost devices or wrongly configured databases. A
survey conducted by (7) reveals that 56% of the data breach
cases are due to human mistakes, and only 39% are due to
phishing. In a report, A Breach of Trust, it was revealed that
4,236 data breach cases occurred in the United Kingdom’s
Local Authorities between April 2011 and April 2014 (11)
as compared to 1,035 data breaches between July 2008 and
July 2011 (12). A Lewisham City Council’s social worker
who accidentally left a bundle of papers on the train, which
contained data of 10 children and third-party information in
relation to sex offenders, police reports, and child protection
reports, decided to resign during the disciplinary procedures
Penalty
Physical Security
Problems in
Local
Governments
Loss of
Data
System
Disruption
Data
Breaches
Figure 1: Types of Security Threats faced by a Local Government
(11).
2
.2 Intellectual Theft
Intellectual theft refers to the act of stealing or using
without permission another person's intellectual property
such as trade secrets, software, contracts, grants, and
agreements. Intellectual theft leads to reputation damage,
loss of competitive advantage, and financial expenses.
According to (7), malware is the cause of 43% of intellectual
theft cases. As reported in a piece of news by the Guardian
2
.5 System Disruption
System disruption occurs when an IT system cannot
execute any functions for a period due to either power
failure, natural disasters, malicious attack by insiders or
outsiders, or human mistakes. In a local government
environment, unplanned downtime in their services will lead
to the government officials’ failure to schedule any
appointments, manage citizen’s complaints, or record their
attendance using electronic records management (ERM)
system in their daily routine. In (7), it was reported that 63%
of system disruption cases in local governments are due to
power failure, while only 28% are due to hackers’ activities.
In a piece of news published by SA News (13), it was
reported that the power failure event at the State Information
Technology Agency (SITA) severely affected the systems of
a few government departments in South Africa, including the
presidency was course by Tshwane power failure. After an
investigation into the matter, it was later found out that the
event occurred due to a failed backup generator in SITA.
This incident caused all government operations, which used
critical data such as birth, marriages, death, smart ID, and
passport services, to get unavailable for a few days. As a
result, SITA executives were blamed for their lack of
disaster recovery procedures and backup plans. They
apologized, but SITA reputation has since damaged.
(9), ten Chinese nationals were charged by U.S. Justice
Department for intellectual theft through phishing schemes,
malware, and domain hijacking into a French aerospace
company in 2015, which was developing engines with a U.S.
company. It is also alleged that the same culprit hacked into
other aerospace companies that are manufacturing the engine
parts using Sakula malware in Massachusetts, Arizona, and
Oregon. Later, it was revealed that the attack was actually
done by two employees of Jiangsu Province Ministry of
State Security (JSSD), six hackers, and two employees of the
French aerospace company.
2
.3 Loss of Data
Data loss is a situation where information is lost or
damaged by failure to properly store, process, or transmit
whether by intentionally erasing, session hijacking,
malware, IoT exploits, human mistakes, or software failure.
Data loss can lead to a service disruption for employees and
6
80