A study on cyber-crimes, threats, security and its emerging trends on latest technologies: influence on the Kingdom of Saudi Arabia

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Now a day the human life penetrated with the technology, like in every moment of life such as shopping or financial transactions and more are using technology in its cyber space. At the same time, it has become very difficult to safe guard the information. The online crime or cybercrime increased along with the heavy usage and development of social media. In case of Saudi Arabia, the cyber-attacks increased because of regional conflicts and low-level awareness about cyber security, and also the perception of Saudi Arabia being extremely wealthy. This paper identifies the importance and impact of cybercrime according to the current situation and Study reports of past activities that have taken place in Saudi Arabia. In addition, described about the cyber security and its emerging trends and latest Technologies along with the policies planned and implemented by the Kingdom of Saudi Arabia. However, the growth of Cyber Crimes becomes proportional to the technological advances. The present paper suggest the solutions to deal with the increasing online crimes in Saudi Arabia with few case studies and have been discussed some innovative suggestions for future cyber security.


  • Keywords


    Cybercrime; Cyber security; Cyber threats; Saudi Arabia; Social media

  • References


      [1] FindLaw, a Thomson Reuters business http://criminal.findlaw.com/criminal-charges/cyber-crimes.html.

      [2] Dacey, Raymond & Gallant, Kenneth S. (1997) "Crime control and harassment of the innocent, " Journal of Criminal Justice, Elsevier, vol. 25(4), pages 325-334.

      [3] https://www.scribd.com/doc/28079943/Cyber-Crime-in-Banking-sector.

      [4] Michael Massourakis & Farahmand Rezvani & Tadashi Yamada (1984) "Occupation, Race, Unemployment and Crime In a Dynamic System, " NBER Working Papers 1256, National Bureau of Economic Research, Inc.

      [5] Panu Poutvaara & Mikael Priks (2005) "Violent Groups and Police Tactics: Should Tear Gas Make Crime Preventers Cry?, " CESifo Working Paper Series 1639, CESifo Group Munich.

      [6] International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 8 (2014), pp. 835-840 © International Research Publications House http://www. irphouse.com.

      [7] Also see: ITU, List of Security-Related Terms and Definitions, available at: www.itu.int/dms_pub/itut/oth/0A/0D/T0A0D00000A0002MSWE.doc.

      [8] See in this context: ITU Global Cybersecurity Agenda / High-Level Experts Group, Global Strategic Report, 2008, page 14, available at: www.itu.int/osg/csd/cybersecurity/gca/global_strategic_report/index.html.

      [9] For more information, see: www.itu.int/osg/csd/cybersecurity/gca/pillars-goals/index.html.

      [10] This publication is available online at: www.itu.int/ITU-D/cyb/cybersecurity/legislation.html

      [11] http://alriyadhdaily.com/article/86f4dc5824044704ae0794b8e0d490ae.

      [12] A Sophos Article 04.12v1.dNA, eight trends changing network security by James Lyne.

      [13] Cyber Security: Understanding Cyber Crimes- Sunit Belapure Nina Godbole.

      [14] Computer Security Practices in Non Profit Organisations – A NetAction Report by Audrie Krause.

      [15] A Look back on Cyber Security 2012 by Luis corrons – Panda Labs.

      [16] https://www.cybersecuritymastersdegree.org/access- control/.

      [17] Prakash Kuppuswamy, Rashida Banu, Nithya Rekha “Preventing and securing data from cyber crime using new authentication method based on block cipher scheme” , IEEE , 2nd International Conference on Anti-Cyber Crimes (ICACC) on 26-27 March 2017, Abha, Saudi Arabia.

      [18] http://www.tnstate.edu/cit/How_to_easily_clean_an_infected_computer.pdf.

      [19] Screen capture: www.clearksysec.com.

      [20] This finding came in a recent study revealed by Kaspersky Lab during a workshop entitled “Security, Information Technology 2017,” which was organized by the Ministry of Interior’s National Cyber Security Center (NCSC) in Riyadh.

      [21] http://www.arabnews.com/node/1169846/saudi-arabia.

      [22] https://researchcenter.paloaltonetworks.com/2016/05/the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoor.

      [23] https://warontherocks.com/2017/07/cyber-attacks-whos-keeping-score/.

      [24] http://www.arabnews.com/saudi-arabia/cybercrime-costs-saudi-arabia-sr-26-bn-year.

      [25] http://www.arabianbusiness.com/industries/technology/382557-saudi-arabia-sets-up-new-cyber-security-body-as-attacks-increase.

      [26] Source: http://www.arabnews.com/news/590406.


 

View

Download

Article ID: 9969
 
DOI: 10.14419/ijet.v7i2.3.9969




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.