Authentication Techniques in eProcurement System: A Review Paper
Main Article Content
Abstract
E-government can give citizens superior and more helpful administration as restricted to conventional government administration. Utilizing an electronic approach in completing an acquirement handle opens up a part of issues with respect to security. The Straight forward nature of the method in hand is requiring a modern security framework. Unauthorized access gets to or distinctive interruptions sorts are showing an authentic danger. Threats include unauthorized access, data leakage, malicious codes, phishing, etc. An effective response to cyber attacks either natural or human-induced harms requires quick investigation of compromise and other information obtained both sometime recently and after the attack. Such data will empower crisis reaction administration in anticipating the attack quickly and rerouting activity proficiently. Moreover, recuperation endeavours depend on the procurement and investigation of opportunities knowing of the assault and sort of assault that might show the nearness of the back entryway, malevolent code, etc. Diverse confirmation strategies and caution frameworks in frameworks and databases containing base data that can be quickly upgraded will help of sparing misfortunes and lessening costs. This review paper in brief, presents the different authentication techniques in eProcurement system.