scholarly journals A study on cyber-crimes, threats, security and its emerging trends on latest technologies: influence on the Kingdom of Saudi Arabia

2018 ◽  
Vol 7 (2.3) ◽  
pp. 54
Author(s):  
Sivaram Rajeyyagari ◽  
Abdullah S. Alotaibi

Now a day the human life penetrated with the technology, like in every moment of life such as shopping or financial transactions and more are using technology in its cyber space. At the same time, it has become very difficult to safe guard the information. The online crime or cybercrime increased along with the heavy usage and development of social media. In case of Saudi Arabia, the cyber-attacks increased because of regional conflicts and low-level awareness about cyber security, and also the perception of Saudi Arabia being extremely wealthy. This paper identifies the importance and impact of cybercrime according to the current situation and Study reports of past activities that have taken place in Saudi Arabia. In addition, described about the cyber security and its emerging trends and latest Technologies along with the policies planned and implemented by the Kingdom of Saudi Arabia. However, the growth of Cyber Crimes becomes proportional to the technological advances. The present paper suggest the solutions to deal with the increasing online crimes in Saudi Arabia with few case studies and have been discussed some innovative suggestions for future cyber security.

Artificial Intelligence (AI) is a buzz word in the cyber world. It is still a developing science in multiple facets according to the challenges thrown by 21st century. Use of AI has become inseparable from human life. In this day and age one cannot imagine a world without AI as it has much significant impact on human life. The main objective of AI is to develop the technology based activities which represents the human knowledge in order to solve problems. Simply AI is study of how an individual think, work, learn and decide in any scenario of life, whether it may be related to problem solving or learning new things or thinking rationally or to arrive at a solution etc. AI is in every area of human life, naming a few it is into gaming, language processing, speech recognition, expert system, vision system, hand writing recognition, intelligence robots, financial transactions and what not, every activity of human life has become a subset of AI. In spite of numerous uses, AI can also used for destroying the human life, that is the reason human inference is required to monitor the AI activities. Cyber crimes has become quite common and become a daily news item. It is not just a problem faced in one country, it is across the world. Without strong security measures, AI is meaningless as it can be easily accessible by others. It has become a big threat for governments, banks, multinational companies through online attacks by hackers. Lot of individual and organizational data is exploited by hackers and it becomes a big threat to the cyber world. In this connection research in the area of AI and cyber security has gained more importance in the recent times and it is ever lasting also as it is a dynamic and sensitive issue linked to human life.


Information ◽  
2022 ◽  
Vol 13 (1) ◽  
pp. 22
Author(s):  
Mohamed Amine Ben Farah ◽  
Elochukwu Ukwandu ◽  
Hanan Hindy ◽  
David Brosset ◽  
Miroslav Bures ◽  
...  

The paper presents a classification of cyber attacks within the context of the state of the art in the maritime industry. A systematic categorization of vessel components has been conducted, complemented by an analysis of key services delivered within ports. The vulnerabilities of the Global Navigation Satellite System (GNSS) have been given particular consideration since it is a critical subcategory of many maritime infrastructures and, consequently, a target for cyber attacks. Recent research confirms that the dramatic proliferation of cyber crimes is fueled by increased levels of integration of new enabling technologies, such as IoT and Big Data. The trend to greater systems integration is, however, compelling, yielding significant business value by facilitating the operation of autonomous vessels, greater exploitation of smart ports, a reduction in the level of manpower and a marked improvement in fuel consumption and efficiency of services. Finally, practical challenges and future research trends have been highlighted.


2021 ◽  
pp. 77-87
Author(s):  
Sonia Ibrahim ◽  
◽  
◽  
◽  
◽  
...  

Cyber security practices mainly involve the prevention of external threats to software, hardware, server data, and other assets which are connected to the internet. Organizations follow a lot of cyber security practices to protect their systems and databases from malicious cyber actors. Cybercriminals use different techniques like spear-phishing, phishing, password attack, denial of service, ransomware, etc. to cause harm to people, organizations, and governments and steal important information from them. We analyzed the use of deep learning algorithms to deal with cyber-attacks. Deep neural networks or deep learning consist of machine learning procedures to support the network to fix complex issues and learn from unmanaged data. In addition, we also analyzed some of the cyber security laws and practices implemented in the US and Saudi Arabia to work collaboratively against cyber threats. It is observed that both countries are doing well against cyberthreats, but they need to work even more to provide training and support to professionals in the public sector who handle sensitive data about cyber security.


Webology ◽  
2020 ◽  
Vol 17 (2) ◽  
pp. 289-295
Author(s):  
Mohammed I. Alghamdi

The cyber-security development for future generations is at stake as a global concern. The existing strategic and policy structures on cyber security and awareness-raising at many levels needs more investigation in order to formulate workable and efficient strategic vision that addresses actual needs and challenges. The justification for this work is therefore to test the robustness, in contrast with some of the most technologically advanced countries on the Asian Continent and others like the USA, Japan, of Saudi Arabia's current cyber security strategy in order to keep the NCSS up-to-date. This research aimed to develop a strategic vision to combat cybercrime to enhance cyber security. The research results confirmed the approval of the members of the study community to a medium degree on the reality of digital extremism and cyber terrorism as seen by the researcher. Moreover, the approval of the members of the study community was to a high degree on the role of combating cybercrime in promoting human security as seen by the researcher. The members of the study community agreed with a high degree on the obstacles identified by the researcher to combat cyber-crimes to enhance human security in Saudi Arabia. There was a high approval of the study community members on the strategic vision developed by the researcher to combat cyber-crimes to enhance human security in Saudi Arabia.


Author(s):  
Abdullahi Chowdhury ◽  
Gour Karmakar ◽  
Joarder Kamruzzaman

With the rapid expansion of digital media and the advancement of the artificial intelligence, robotics has drawn the attention of cyber security research community. Robotics systems use many Internet of Things (IoT) devices, web interface, internal and external wireless sensor networks and cellular networks for better communication and smart services. Individuals, industries and governments organisations are facing financial loses, losing time and sensitive data due these cyber attacks. The use these different devices and networks in robotics systems are creating new vulnerabilities and potential risk for cyber attacks. This chapter discusses about the possible cyber attacks and economics losses due to these attacks in robotics systems. In this chapter, we analyse the increasing uses of public and private robots, which has created possibility of having more cyber-crimes. Finally, contemporary and important mitigation approaches for these cyber attacks in robotic systems have been discussed in this chapter.


2019 ◽  
Vol 8 (4) ◽  
pp. 8643-8645

Artificial Intelligence (AI) is a buzz word in the cyber world. It is still a developing science in multiple facets according to the challenges thrown by 21st century. Use of AI has become inseparable from human life. In this day and age one cannot imagine a world without AI as it has much significant impact on human life. The main objective of AI is to develop the technology based activities which represents the human knowledge in order to solve problems. Simply AI is study of how an individual think, work, learn and decide in any scenario of life, whether it may be related to problem solving or learning new things or thinking rationally or to arrive at a solution etc. AI is in every area of human life, naming a few it is into gaming, language processing, speech recognition, expert system, vision system, hand writing recognition, intelligence robots, financial transactions and what not, every activity of human life has become a subset of AI. In spite of numerous uses, AI can also used for destroying the human life, that is the reason human inference is required to monitor the AI activities. Cyber crimes has become quite common and become a daily news item. It is not just a problem faced in one country, it is across the world. Without strong security measures, AI is meaningless as it can be easily accessible by others. It has become a big threat for governments, banks, multinational companies through online attacks by hackers. Lot of individual and organizational data is exploited by hackers and it becomes a big threat to the cyber world. In this connection research in the area of AI and cyber security has gained more importance in the recent times and it is ever lasting also as it is a dynamic and sensitive issue linked to human life.


2019 ◽  
pp. 1426-1441
Author(s):  
Abdullahi Chowdhury ◽  
Gour Karmakar ◽  
Joarder Kamruzzaman

With the rapid expansion of digital media and the advancement of the artificial intelligence, robotics has drawn the attention of cyber security research community. Robotics systems use many Internet of Things (IoT) devices, web interface, internal and external wireless sensor networks and cellular networks for better communication and smart services. Individuals, industries and governments organisations are facing financial loses, losing time and sensitive data due these cyber attacks. The use these different devices and networks in robotics systems are creating new vulnerabilities and potential risk for cyber attacks. This chapter discusses about the possible cyber attacks and economics losses due to these attacks in robotics systems. In this chapter, we analyse the increasing uses of public and private robots, which has created possibility of having more cyber-crimes. Finally, contemporary and important mitigation approaches for these cyber attacks in robotic systems have been discussed in this chapter.


Author(s):  
Shruti Sunil Ajankar ◽  
Aditi Rajesh Nimodiya

Cyber Security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. So basically it is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks. It aims to reduce the risks of cyber attacks and protect against the unauthorized exploitation of systems, networks and technologies. Whenever we think about the cyber security the first thing that comes to our mind is ‘cyber crimes’ which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cyber crimes. Besides various measures cyber security is still a very big concern to many. This paper mainly focuses on some of the techniques and perspectives on transforming the cyber security. Here we have discussed a new posture for cyber security in a networked world which explains how companies can use organizational structure and governance to enhance cyber security protections.


Author(s):  
Isaac Chin Eian ◽  
Lim Ka Yong ◽  
Majesty Yeap Xiao Li ◽  
Yeo Hui Qi ◽  
Fatima Z

In this COVID-19 pandemic, the use and dependency on Internet has grown exponentially. The number of people doing online activities such as e-learning, remote working, online shopping and others have increased. This has also led to increased vulnerability to cyber crimes. Cyber security attacks have become a serious problem. The common types of cyber security attacks are phishing, malware, ransomware, social engineering, identity theft and denial-of-service. The attackers target the victims in order to get their credential information or financial benefits. Those people who are doing online activities are vulnerable to cyber threats. This is because the network is not safe. The attackers are able to code according to the weaknesses of the Internet. Once the attackers hack into the devices, they have the root access and can do whatever they want to do with the device. In this research paper, the concept of cyber security attack and detailed research about real attacks are discussed. This is followed by detailed review about the recent cyber security attacks with a critical analysis. Moreover, the research paper will be proposing the latest research contribution of cyber security during COVID-19 and the implementation scenario which will give the examples about how the companies maintain privacy as well as the limitations. Then, the paper will be discussing the reasons that people are vulnerable to cyber security and the unique solution to the problems stated. Finally, this paper will conclude with an in-depth analysis and future direction for cyber security research.


Sign in / Sign up

Export Citation Format

Share Document