Cyber-attacks detection & protection in Kuwait government sectors

The world nowadays has witnessed a lot of crimes of cyber-attacks where many people suffered from many hackers who tried to steal important information or damage the programs found in the computers of victims. There has become necessity for companies to have different systems for protection. Ma...

Full description

Bibliographic Details
Main Authors: Alshaikhli, Imad Fakhri Taha, Al-Enezi , Khalid Abdulkareem, Al-kandari, Abdulrahman, Mahmood Al Dabbagh, Sufyan Salim
Format: Conference or Workshop Item
Language:English
Published: 2014
Subjects:
Online Access:http://irep.iium.edu.my/42858/
http://irep.iium.edu.my/42858/
http://irep.iium.edu.my/42858/1/07076868.pdf
id iium-42858
recordtype eprints
spelling iium-428582018-06-20T01:35:02Z http://irep.iium.edu.my/42858/ Cyber-attacks detection & protection in Kuwait government sectors Alshaikhli, Imad Fakhri Taha Al-Enezi , Khalid Abdulkareem Al-kandari, Abdulrahman Mahmood Al Dabbagh, Sufyan Salim QA75 Electronic computers. Computer science The world nowadays has witnessed a lot of crimes of cyber-attacks where many people suffered from many hackers who tried to steal important information or damage the programs found in the computers of victims. There has become necessity for companies to have different systems for protection. Many companies have been specialized in having systems for protection of these risks of hackers. Process of protection from cyber-attacks can be identified based on three main steps; reactive services, proactive services and security quality management. Such issues will be discussed in this research to help companies identify different risks against their computer systems to put an end to such attacks. 2014-04-01 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/42858/1/07076868.pdf Alshaikhli, Imad Fakhri Taha and Al-Enezi , Khalid Abdulkareem and Al-kandari, Abdulrahman and Mahmood Al Dabbagh, Sufyan Salim (2014) Cyber-attacks detection & protection in Kuwait government sectors. In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014, 29-30 Dec 2014, Amman- Jordan. http://unitech-kl.com/acsat/
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Alshaikhli, Imad Fakhri Taha
Al-Enezi , Khalid Abdulkareem
Al-kandari, Abdulrahman
Mahmood Al Dabbagh, Sufyan Salim
Cyber-attacks detection & protection in Kuwait government sectors
description The world nowadays has witnessed a lot of crimes of cyber-attacks where many people suffered from many hackers who tried to steal important information or damage the programs found in the computers of victims. There has become necessity for companies to have different systems for protection. Many companies have been specialized in having systems for protection of these risks of hackers. Process of protection from cyber-attacks can be identified based on three main steps; reactive services, proactive services and security quality management. Such issues will be discussed in this research to help companies identify different risks against their computer systems to put an end to such attacks.
format Conference or Workshop Item
author Alshaikhli, Imad Fakhri Taha
Al-Enezi , Khalid Abdulkareem
Al-kandari, Abdulrahman
Mahmood Al Dabbagh, Sufyan Salim
author_facet Alshaikhli, Imad Fakhri Taha
Al-Enezi , Khalid Abdulkareem
Al-kandari, Abdulrahman
Mahmood Al Dabbagh, Sufyan Salim
author_sort Alshaikhli, Imad Fakhri Taha
title Cyber-attacks detection & protection in Kuwait government sectors
title_short Cyber-attacks detection & protection in Kuwait government sectors
title_full Cyber-attacks detection & protection in Kuwait government sectors
title_fullStr Cyber-attacks detection & protection in Kuwait government sectors
title_full_unstemmed Cyber-attacks detection & protection in Kuwait government sectors
title_sort cyber-attacks detection & protection in kuwait government sectors
publishDate 2014
url http://irep.iium.edu.my/42858/
http://irep.iium.edu.my/42858/
http://irep.iium.edu.my/42858/1/07076868.pdf
first_indexed 2023-09-18T21:01:04Z
last_indexed 2023-09-18T21:01:04Z
_version_ 1777410627071901696