scholarly journals Cybersecurity Policy Framework in Saudi Arabia: Literature Review

2021 ◽  
Vol 3 ◽  
Author(s):  
Nawaf Alhalafi ◽  
Prakash Veeraraghavan

Saudi Arabia has a goal of ensuring that it has at least two cities among the top 100 smart cities of the future. However, increasing connectivity and incorporation of smart solutions in cities still raises concerns over cyber security with threats arising daily including denial of services and phishing as some of the most significant. Saudi Arabia, therefore, needs a cybersecurity policy framework that will ensure effective protection for all stakeholders in the smart city from these cyber threats. User acceptance is foremost important in any new technology, including smart-cities. Due to ongoing cyber threats and in the absence of an efficient cyber policies, Saudi end-user community is not keen to accept newer technologies where their interaction with online medium is required. The proliferation of smart cities globally affords the opportunity to analyze and compare the efforts made in Saudi Arabia with other nations like the USA, India and Singapore which is the premier smart city model in the globe currently. This review looks at the similarities and differences between KSA’s cyber security policy framework with these three nations. The review will note some of the defining characteristics and approaches to cyber security in the smart cities of USA, India, and Singapore. After reviewing the current framework in Saudi Arabia, this paper will make suggestions such as updating Saudi’s cybercrime legislation like in the US or formulating a master cyber security plan as seen in Singapore that will improve KSA’s framework creating the best framework model for cyber security in its smart cities.

2021 ◽  
pp. 2141002
Author(s):  
Zang Huiyi ◽  
C Chandru Vignesh ◽  
J Alfred Daniel

Sustainability is becoming one of the organizational plans of intelligent communities. They represent the critical approach to a prosperous future. In another direction, the smart city is aimed at tackling renewable energy challenges. This research explores energy conservation’s impact from a labour market viewpoint of the Efficient Smart Cities model. The study meets the study divide on developing the power manager career in cities environmentally urban paradigm. This research’s primary purpose is to establish a current detailed approach to certification bodies’ skills that focus on new technology. The proposed Social and environmental responsibility in energy efficiency management for the Smart City (SER-EEM) framework represents the convergence between the conceptual and functional methods. For the presentation of labour market scientific studies, qualitative data were shown. The conclusion is that conservation and cloud computing are the central components of the Sustainable Smart City model. Work market analysis divided energy executives into developing nation’s expertise in terms of quantity and composition of production, and matching criteria for qualification were identified. The power management’s capability model comprises many core categories related to particular expertise, social competencies and behavioural competencies. By incorporating this study of resource management skills in industrial and non-commercial companies such as educational institutions and training classes, current research results will lead to development and awareness.


2016 ◽  
Vol 12 (2) ◽  
pp. 77-93 ◽  
Author(s):  
Leonidas Anthopoulos ◽  
Marijn Janssen ◽  
Vishanth Weerakkody

Smart cities have attracted an extensive and emerging interest from both science and industry with an increasing number of international examples emerging from all over the world. However, despite the significant role that smart cities can play to deal with recent urban challenges, the concept has been being criticized for not being able to realize its potential and for being a vendor hype. This paper reviews different conceptualization, benchmarks and evaluations of the smart city concept. Eight different classes of smart city conceptualization models have been discovered, which structure the unified conceptualization model and concern smart city facilities (i.e., energy, water, IoT etc.), services (i.e., health, education etc.), governance, planning and management, architecture, data and people. Benchmarking though is still ambiguous and different perspectives are followed by the researchers that measure -and recently monitor- various factors, which somehow exceed typical technological or urban characteristics. This can be attributed to the broadness of the smart city concept. This paper sheds light to parameters that can be measured and controlled in an attempt to improve smart city potential and leaves space for corresponding future research. More specifically, smart city progress, local capacity, vulnerabilities for resilience and policy impact are only some of the variants that scholars pay attention to measure and control.


2018 ◽  
Author(s):  
Peter M. Shane

This critique of Karson K. Thompson’s note, "Not Like an Egyptian: Cybersecurity and the Internet Kill Switch Debate," argues that the U.S. lacks a framework of laws and regulations, "smart" or otherwise, that adequately incentivizes the parties with the greatest capacity to improve our cyber security to do so. It attributes the poor state of U.S. cyber policy to the "bewildering array of overlapping responsibilities" scattered among government offices and departments; the difficult imperative of sharing responsibility among military and civilian authorities; the fact that most of the networks (and the dependent critical infrastructures) that need protecting are in private hands; and the lack of public understanding of the kinds of regulation that are necessary or appropriate. The essay argues that meaningful progress towards an adequate legal framework depends on a broad national debate aimed at defining the public good with regard to cyber-security, and the inevitable trade-offs among security, privacy, productivity, economic growth, organizational flexibility, military effectiveness, government transparency, and accountability that must be confronted in making sensible cyber-security policy.


2020 ◽  
Vol 60 (11) ◽  
pp. 16-20
Author(s):  
Vugar Hajimahmud Abdullayev ◽  
◽  
Vusala Alyag Abuzarova ◽  

The article is devoted to the study of cyber security problems in the Smart Cities system. The development of the IT industry has led to the introduction of new technologies into our lives. One of these technologies is the Internet of Things technology. The application of IoT technology has increased in recent years. One of the most important areas in which Internet of Things technology is applied is the Smart Cities system. The main difference between smart cities and other cities is that their components are connected to each other via the Internet. All these smart devices create a smart city system in general. One of the biggest and most important problems in many areas where the Internet is used is security. The article looks at possible security problems in the system of smart cities and solutions to ensure cyber security. Key words: Smart city; Internet of Things; Information technologies; Security; Cyber security


2014 ◽  
pp. 471-514
Author(s):  
Catherine B. Lotrionte

This chapter discusses the nature of cyber threats against government and private computer systems, describing some steps the government has taken and the challenges involved in protecting those systems. The chapter argues that a national security approach for cyber security policy is the most promising option for preventing these cyber threats while operating within the domestic legal framework. After a review of the President's constitutional authorities to protect the nation from traditional threats, the chapter concludes that the President has some power to monitor Internet communications in transit within the United States when the communications threaten the welfare of the nation. The chapter recommends that this authority be augmented by Congressional action through legislation. The President's powers in cyber security, even given Congressional support, however, are still restrained by the protections the Fourth Amendment provides for traditional forms of communication and individual privacy. Although there is limited Fourth Amendment precedent in the area of cyber security, the well-established exceptions to the Fourth Amendment requirements, based on consent, special governmental needs and the reasonableness of the search or seizure, provide a legal basis for executive branch action to protect critical infrastructures and their computer systems. As the Courts have long held, these exceptions allow the government to conduct searches or seizures without being bound by all of the requirements of the Fourth Amendment. If the government develops its cyber security policy in line with these exceptions, this chapter argues the government can both protect critical computer systems and operate within Fourth Amendment doctrine that recognizes the legitimacy of privacy in electronic communications.


Author(s):  
Amtul Waheed ◽  
Jana Shafi

Smart cities are established on some smart components such as smart governances, smart economy, science and technology, smart politics, smart transportation, and smart life. Each and every smart object is interconnected through the internet, challenging the security and privacy of citizen's sensitive information. A secure framework for smart cities is the only solution for better and smart living. This can be achieved through IoT infrastructure and cloud computing. The combination of IoT and Cloud also increases the storage capacity and computational power and make services pervasive, cost-effective, and accessed from anywhere and any device. This chapter will discuss security issues and challenges of smart city along with cyber security framework and architecture of smart cities for smart infrastructures and smart applications. It also presents a general study about security mechanism for smart city applications and security protection methodology using IOT service to stand against cyber-attacks.


2022 ◽  
pp. 1459-1480
Author(s):  
Anand Nayyar ◽  
Rachna Jain ◽  
Bandana Mahapatra ◽  
Anubhav Singh

Smart cities are composed of interlinked components with constant data transfer and services targeted at increasing the life style of the people. The chapter focuses on diverged smart city components as well as the security models designed to be implemented. The four major paradigms discussed in this chapter are smart grids, building automation system (BAS), unmanned aerial vehicle (UAV), and smart vehicles. Apart from addressing the security concerns of every component, the major highlights of this chapter are architecture, smart environment, industry, lifestyle, services, and digital lifestyle quality. Finally, the chapter focuses on privacy preserving mechanisms, its essence over smart cities, strong architecture related to privacy, preserving mechanism, and various approaches available that can retaliate these issues in a smart city environment.


2018 ◽  
Vol 3 (1) ◽  
pp. 179-186
Author(s):  
Judith Hermanson

This article describes IHC Global’s “Smart City. Just City” initiative which it launched at a panel at the ninth World Urban Forum (WUF 9) held in Kuala Lumpur in February 2018.  The initiative is a key component of IHC Global’s commitment to the New Urban Agenda and to achieving the aims of Global Goal 11.  By seeking to align two different approaches to urban development – the technology driven “smart city” approach and the “social justice” informed “just city” approach – its goal is to fill a policy and practice gap with a policy framework and supporting indicators which will enable cities to intentionally use technology to achieve greater inclusiveness and equity and so to create places and spaces which are both “smart” and “just.” Too often “smart cities” focus on technology almost exclusively and when other benefits are seen as “by-products” of the technology.  On the other hand, the human-centered focus of “just cities” too often fails to think sufficiently progressively or to use available technologies to advance its goals.  “Smart City. Just City” aims to bring these two approaches together, to show that “technology” and “human centeredness” are not mutually exclusive terms and that the often private-sector driven use of technology can in fact serve “public good” purposes when these purposes are intentionally pursued.  IHC Global’s premise is that when a city uses smart technology with the purpose to achieve greater inclusiveness and justice, divisions will be lessened; economic opportunities will be more plentiful and widely available; a large number of people will be more robustly prepared to cope with natural and other “shocks”; and the city, as a whole, will prosper.


2020 ◽  
Vol 4 (1) ◽  
pp. 044-046
Author(s):  
Beretas Christos P

Industrial control systems (ICS) are critical, as in these systems, cyber threats have the potential to affect, disorganize, change their mode of operation, act as an information extraction vehicle, and ultimately turn against itself. Creating risks to the system itself, infrastructure, downtime, leakage of sensitive data, and even loss of human life. Industrial control systems (ICS) are vital to the operation of all the modern automated infrastructure in the western world, such as power plant and power stations. Industrial control systems (ICS) differ from the traditional information systems and infrastructures of organizations and companies, a standard cyber security strategy cannot be implemented but part of it adapting to the real facts and needs of each country, legislation and infrastructure. These systems require continuous operation, reliability and rapid recovery when attacked electronically with automated control, isolation and attack management processes. Incorrect settings and lack of strategic planning can lead to unprotected operation of critical installations, as they do not meet the cyber security requirements. Industrial control systems (ICS) require special protection in their networks, as they should be considered vulnerable in all their areas, they need protection from cyber attacks against ICS, SCADA servers, workstations, PLC automations, etc. Security policies to be implemented should provide protection against cyber threats, and systems recovery without affecting the operation and reliability of operating processes. Security policies such as security assessment, smart reporting, vulnerability and threat simulation, integrity control analysis, apply security policy to shared systems, intrusion detection and prevention, and finally firewall with integrated antivirus and sandbox services should be considered essential entities.


2021 ◽  
Vol 110 ◽  
pp. 05003
Author(s):  
Konstantin Semyachkov

The article examines the impact of digital technologies on the sustainable development of ecological and economic systems. The main aspects that make the development of digital technologies especially relevant for environmental modernization and sustainable development are analyzed. It is shown that the large-scale use of digital technologies contributes to the development of new tools, models and methods of urban management. One of the promising areas for the development of the urban environment in these conditions is the concept of a smart city. Based on the analysis of research on the topic of smart cities, the effects of the use of the smart city model for the formation of the foundations of sustainable development of territories are noted.


Sign in / Sign up

Export Citation Format

Share Document