An Overview of Security Management in Saudi Arabia

被引:0
作者
Almutairi, Mishaal Mofleh [1 ]
Halikias, George [2 ]
Yamin, Mohammad [3 ]
机构
[1] Buraidah Coll Technol, Buraydah, Saudi Arabia
[2] City Univ LONDON, Sch Math Comp Sci & Engn, London, England
[3] Australian Natl Univ, Res Sch Comp Sci, Canberra, ACT, Australia
来源
PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020) | 2019年
关键词
Saudi Arabia; data safety management; cyber-attacks; management; information security risk numagement; data; IMPROVING PRIVACY;
D O I
10.23919/indiacom49435.2020.9083725
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the advancement and proliferation of technology and increasing cyber-attacks, Information security has become a critical aspect of asset protection. Cognizant of this fact, many organizations and countries like Saudi Arabia have put into place information security and enforcement policies for data security management. In this article we provide an overview of information security management in Saudi Arabia. Based on our research, we raise a number of critical concerns which should be addressed by the information security management authority in Saudi Arabia.
引用
收藏
页码:261 / 265
页数:5
相关论文
共 21 条
  • [1] Abu-Musa AA, 2006, J KING SAUD UNIV-COM, V18, P1
  • [2] Alfuraih S., 2008, 2008 INT C INF SEC A
  • [3] Alotaibi M, 2019, INT J COMPUT SCI NET, V19, P69
  • [4] Alshareef N., 2016, MODEL INFORM SECURIT
  • [5] Alsmadi I., 2019, The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics
  • [6] Alsmadi I, 2018, 2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018)
  • [7] Alzahrani A., 2016, International Journal of Computer Science Issues, V13, P129, DOI DOI 10.20943/01201606.129135
  • [8] Information security practice in Saudi Arabia: case study on Saudi organizations
    Alzamil, Zakarya A.
    [J]. INFORMATION AND COMPUTER SECURITY, 2018, 26 (05) : 568 - 583
  • [9] [Anonymous], 2018, 2018 INT C CYB SEC P, DOI [10.1109/cybersecpods.2018.8560669, DOI 10.1109/CYBERSECP0DS.2018.8560669]
  • [10] [Anonymous], 2019, 2019 2 INT C COMP AP