Cyber-attacks detection & protection in Kuwait government sectors
The world nowadays has witnessed a lot of crimes of cyber-attacks where many people suffered from many hackers who tried to steal important information or damage the programs found in the computers of victims. There has become necessity for companies to have different systems for protection. Ma...
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2014
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/42858/ http://irep.iium.edu.my/42858/ http://irep.iium.edu.my/42858/1/07076868.pdf |
id |
iium-42858 |
---|---|
recordtype |
eprints |
spelling |
iium-428582018-06-20T01:35:02Z http://irep.iium.edu.my/42858/ Cyber-attacks detection & protection in Kuwait government sectors Alshaikhli, Imad Fakhri Taha Al-Enezi , Khalid Abdulkareem Al-kandari, Abdulrahman Mahmood Al Dabbagh, Sufyan Salim QA75 Electronic computers. Computer science The world nowadays has witnessed a lot of crimes of cyber-attacks where many people suffered from many hackers who tried to steal important information or damage the programs found in the computers of victims. There has become necessity for companies to have different systems for protection. Many companies have been specialized in having systems for protection of these risks of hackers. Process of protection from cyber-attacks can be identified based on three main steps; reactive services, proactive services and security quality management. Such issues will be discussed in this research to help companies identify different risks against their computer systems to put an end to such attacks. 2014-04-01 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/42858/1/07076868.pdf Alshaikhli, Imad Fakhri Taha and Al-Enezi , Khalid Abdulkareem and Al-kandari, Abdulrahman and Mahmood Al Dabbagh, Sufyan Salim (2014) Cyber-attacks detection & protection in Kuwait government sectors. In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014, 29-30 Dec 2014, Amman- Jordan. http://unitech-kl.com/acsat/ |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Alshaikhli, Imad Fakhri Taha Al-Enezi , Khalid Abdulkareem Al-kandari, Abdulrahman Mahmood Al Dabbagh, Sufyan Salim Cyber-attacks detection & protection in Kuwait government sectors |
description |
The world nowadays has witnessed a lot of crimes of
cyber-attacks where many people suffered from many hackers
who tried to steal important information or damage the
programs found in the computers of victims. There has become
necessity for companies to have different systems for
protection. Many companies have been specialized in having
systems for protection of these risks of hackers. Process of
protection from cyber-attacks can be identified based on three
main steps; reactive services, proactive services and security
quality management. Such issues will be discussed in this
research to help companies identify different risks against
their computer systems to put an end to such attacks. |
format |
Conference or Workshop Item |
author |
Alshaikhli, Imad Fakhri Taha Al-Enezi , Khalid Abdulkareem Al-kandari, Abdulrahman Mahmood Al Dabbagh, Sufyan Salim |
author_facet |
Alshaikhli, Imad Fakhri Taha Al-Enezi , Khalid Abdulkareem Al-kandari, Abdulrahman Mahmood Al Dabbagh, Sufyan Salim |
author_sort |
Alshaikhli, Imad Fakhri Taha |
title |
Cyber-attacks detection & protection in Kuwait government
sectors |
title_short |
Cyber-attacks detection & protection in Kuwait government
sectors |
title_full |
Cyber-attacks detection & protection in Kuwait government
sectors |
title_fullStr |
Cyber-attacks detection & protection in Kuwait government
sectors |
title_full_unstemmed |
Cyber-attacks detection & protection in Kuwait government
sectors |
title_sort |
cyber-attacks detection & protection in kuwait government
sectors |
publishDate |
2014 |
url |
http://irep.iium.edu.my/42858/ http://irep.iium.edu.my/42858/ http://irep.iium.edu.my/42858/1/07076868.pdf |
first_indexed |
2023-09-18T21:01:04Z |
last_indexed |
2023-09-18T21:01:04Z |
_version_ |
1777410627071901696 |