Comparison between Saudi Arabia and USA: Prevention and Dealing with Cyber Security

2021 ◽  
pp. 77-87
Author(s):  
Sonia Ibrahim ◽  
◽  
◽  
◽  
◽  
...  

Cyber security practices mainly involve the prevention of external threats to software, hardware, server data, and other assets which are connected to the internet. Organizations follow a lot of cyber security practices to protect their systems and databases from malicious cyber actors. Cybercriminals use different techniques like spear-phishing, phishing, password attack, denial of service, ransomware, etc. to cause harm to people, organizations, and governments and steal important information from them. We analyzed the use of deep learning algorithms to deal with cyber-attacks. Deep neural networks or deep learning consist of machine learning procedures to support the network to fix complex issues and learn from unmanaged data. In addition, we also analyzed some of the cyber security laws and practices implemented in the US and Saudi Arabia to work collaboratively against cyber threats. It is observed that both countries are doing well against cyberthreats, but they need to work even more to provide training and support to professionals in the public sector who handle sensitive data about cyber security.

Author(s):  
Akanksha Sharma ◽  
Prashant Tandekar

Information and Communications Technologies (ICTs), particular the Internet, have been an increasingly important aspect of global social, political and economic life, and are the backbone of the global information society today. Their evolution and development has brought many benefits along with the threat of serious cyber-attacks that had been demonstrated over the past few years. Due to cybercrime business world drains huge money each year and incurs a large amount in resolving a single attack. It also damages organization's reputation and brand image, loss of intellectual property and sensitive data, loss of customer trust etc. Addressing major threats and challenges begins with setting up information security policy to ensure confidentiality, integrity and availability of company information and communication. Since telecom Sector is on its boom, a technological solution can solve the immediate challenges of identifying, investigating, and prosecuting computer- related crimes and changes required for long-term problem solving.


2021 ◽  
Vol 10 (2) ◽  
pp. 38-45
Author(s):  
Saiida Lazaar

The great revolution of technology and its fast growth have led to a cyber space increasingly vulnerable to cyber-attacks. For this reason, cyber security becomes paramount to protect our cyber space by presenting and implementing important solutions to protect sensitive data from malicious persons. Thereby various measures of protection have been developed and aim to minimize the risks and damages of attacks. Among them, cryptography plays a vital and crucial role in protecting sensitive transmissions and electronic exchanges through complex networks. Numerous scientific studies have emerged with the advent of the cloud and the Internet of Things (IoT); all of them have expressed a strong need for building secure, efficient and fast cryptosystems targeting confidentiality, integrity and authentication. The last two objectives are essentially built on hash functions which are the main components of many applications and secure networks. The purpose of this paper is to give recent advances of lightweight cryptographic solutions that meet the requirements of constrained systems, and to present a study, in terms of security, energy-consuming and efficiency, of the main hash functions standardized by NIST (National Institute of Standards and Technology). In the end, the paper will give a comparison between the studied hash functions aiming to come up with a recommendation of good lightweight hash functions suitable for implementation in an IoT framework.


Author(s):  
Iqbal H. Sarker

Deep learning (DL), which is originated from an artificial neural network (ANN), is one of the major technologies of today's smart cybersecurity systems or policies to function in an intelligent manner. Popular deep learning techniques, such as Multi-layer Perceptron (MLP), Convolutional Neural Network (CNN or ConvNet), Recurrent Neural Network (RNN) or Long Short-Term Memory (LSTM), Self-organizing Map (SOM), Auto-Encoder (AE), Restricted Boltzmann Machine (RBM), Deep Belief Networks (DBN), Generative Adversarial Network (GAN), Deep Transfer Learning (DTL or Deep TL), Deep Reinforcement Learning (DRL or Deep RL), or their ensembles and hybrid approaches can be used to intelligently tackle the diverse cybersecurity issues. In this paper, we aim to present a comprehensive overview from the perspective of these neural networks and deep learning techniques according to today's diverse needs. We also discuss the applicability of these techniques in various cybersecurity tasks such as intrusion detection, identification of malware or botnets, phishing, predicting cyber-attacks, e.g. denial of service (DoS), fraud detection or cyber-anomalies, etc. Finally, we highlight several research issues and future directions within the scope of our study in the field. Overall, the ultimate goal of this paper is to serve as a reference point and guidelines for the academia and professionals in the cyber industries, especially from the deep learning point of view.


2018 ◽  
pp. 1208-1221
Author(s):  
Akanksha Sharma ◽  
Prashant Tandekar

Information and Communications Technologies (ICTs), particular the Internet, have been an increasingly important aspect of global social, political and economic life, and are the backbone of the global information society today. Their evolution and development has brought many benefits along with the threat of serious cyber-attacks that had been demonstrated over the past few years. Due to cybercrime business world drains huge money each year and incurs a large amount in resolving a single attack. It also damages organization's reputation and brand image, loss of intellectual property and sensitive data, loss of customer trust etc. Addressing major threats and challenges begins with setting up information security policy to ensure confidentiality, integrity and availability of company information and communication. Since telecom Sector is on its boom, a technological solution can solve the immediate challenges of identifying, investigating, and prosecuting computer- related crimes and changes required for long-term problem solving.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 389
Author(s):  
T Sreeja ◽  
Dr Manna Sheela Rani Chetty ◽  
Sekhar Babu Boddu

The spiking landscape of cyber-attacks is reflecting its trend towards invoking vulnerabilities in a web application. The vulnerabilities seem to be over-growing second by second beside being over-coming time to time. The reason behind is, new attack vectors are often being deployed by the threat actors. The global cyber security market alone has brought a turnover of about $350 billion, which shows how wide the attack landscape is and how expensive it is to detect, protect and respond to the cyber issues. Most of the security experts have quoted that, the average cost of a data breach will exceed to $150million by 2020 and about 80 percent of the global demography were nowhere aware of such attacks. From the past few years, SQL injection is acting as a major vector in breaching the sensitive data. Detecting SQL injection through log correlation is the most effective methodology utilized under adaptive environments seeking no tool investigation. This paper exposes a detection methodology of an SQL injection attack without any mere concentration on automated tools. The paper goes with a motto of detection through configuring the available resources like web server,database,and an IDS in a way of creating adaptable environment that can bring the entire attacker information through log analysis. The paper would represent the attacker phases in a finite automata.  


2006 ◽  
Vol 60 (3) ◽  
pp. 421-443 ◽  
Author(s):  
Gawdat Bahgat

Since the 1970s, the world's attention has focused on nuclear proliferation in Iran and Iraq. Very little attention has been given to nuclear proliferation in the third regional power in the Persian Gulf — Saudi Arabia. This article addresses the question of potential Saudi nuclear ambition. Most policymakers and analysts agree that Saudi Arabia does not possess nuclear weapons. Still, some argue that the Kingdom has both strategic incentives and financial resources to pursue a nuclear program. This article examines the security threats to Saudi Arabia from Iran, Iraq, Israel, and Yemen. It also analyzes the impact of domestic economic and political reform on Riyadh's security policy. The article argues that the US' strong commitments to defend Saudi Arabia against external threats have been crucial in reducing incentives to acquire nuclear weapons.


2021 ◽  
Author(s):  
Regonda Nagaraju ◽  
Selvanayaki Kolandapalayam Shanmugam ◽  
Sivaram Rajeyyagari ◽  
Jupeth Toriano Pentang ◽  
B Kiran Bala ◽  
...  

Abstract E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An established validation and management system could face a single failure point and the system is prone to Distributed Denial of Service Attacks (DDoS), denial of service attacks (DoS), malware and other cyber attacks. The execution of a privacy preserving and a secure decentralized system is enabled by the block chain technology. Here any third-party organizations do not have any control over the transactions of the Government. With the help of block chain technology, new and existing data are encapsulated within ledger or blocks, which are evenly distributed through the network in an enduring and sustainable way. The privacy and security of information are improved with the help of block chain technology, where distribution and encryption of data are performed through the total network. This analytical paper maps out the analysis of the security in the e-government system, utilizing the block chain technology that provides privacy and security of information and thereby enhancing the trust among the public sector. Qualitative and theoretical analysis is made for the proposed topic and implications of privacy and security of the proposed system is made.


2021 ◽  
Vol 1 (4) ◽  
pp. 22-26
Author(s):  
Ankita Saha ◽  
Chanda Pathak ◽  
Sourav Saha

The importance of cybersecurity is on the rise as we have become more technologically dependent on the internet than ever before. Cybersecurity implies the process of protecting and recovering computer systems, networks, devices, and programs from any cyber attack. Cyber attacks are an increasingly sophisticated and evolving danger to our sensitive data, as attackers employ new methods to circumvent traditional security controls. Cryptanalysis is mainly used to crack cryptographic security systems and gain access to the contents of the encrypted messages, even if the key is unknown. It focuses on deciphering the encrypted data as it works with ciphertext, ciphers, and cryptosystems to understand how they work and find techniques for weakening them. For classical cryptanalysis, the recovery of ciphertext is difficult as the time complexity is exponential. The traditional cryptanalysis requires a significant amount of time, known plaintexts, and memory. Machine learning may reduce the computational complexity in cryptanalysis. Machine learning techniques have recently been applied in cryptanalysis, steganography, and other data-securityrelated applications. Deep learning is an advanced field of machine learning which mainly uses deep neural network architecture. Nowadays, deep learning techniques are usually explored extensively to solve many challenging problems of artificial intelligence. But not much work has been done on deep learning-based cryptanalysis. This paper attempts to summarize various machine learning based approaches for cryptanalysis along with discussions on the scope of application of deep learning techniques in cryptography.


Author(s):  
Ana Gavrovska ◽  
Andreja Samčović

Artificial intelligence is making significant changes in industrial internet of things (IIoT). Particularly, machine and deep learning architectures are now used for cybersecurity in smart factories, smart homes, and smart cities. Using advanced mathematical models and algorithms more intelligent protection strategies should be developed. Hacking of IP surveillance camera systems and Closed-Circuit TV (CCTV) vulnerabilities represent typical example where cyber attacks can make severe damage to physical and other Industrial Control Systems (ICS). This chapter analyzes the possibilities to provide better protection of video surveillance systems and communication networks. The authors review solutions related to migrating machine learning based inference towards edge and smart client devices, as well as methods for DDoS (Distributed Denial of Service) intelligent detection, where DDoS attack is recognized as one of the primary concerns in cybersecurity.


Author(s):  
Abdullahi Chowdhury ◽  
Gour Karmakar ◽  
Joarder Kamruzzaman

With the rapid expansion of digital media and the advancement of the artificial intelligence, robotics has drawn the attention of cyber security research community. Robotics systems use many Internet of Things (IoT) devices, web interface, internal and external wireless sensor networks and cellular networks for better communication and smart services. Individuals, industries and governments organisations are facing financial loses, losing time and sensitive data due these cyber attacks. The use these different devices and networks in robotics systems are creating new vulnerabilities and potential risk for cyber attacks. This chapter discusses about the possible cyber attacks and economics losses due to these attacks in robotics systems. In this chapter, we analyse the increasing uses of public and private robots, which has created possibility of having more cyber-crimes. Finally, contemporary and important mitigation approaches for these cyber attacks in robotic systems have been discussed in this chapter.


Sign in / Sign up

Export Citation Format

Share Document