Security risk analysis used by Kuwait government sectors
Permanent use of computer in our daily lives has to be protect our personal information from any external threat, if cyber security is the solution to build a safe space greeting mail in government agencies. Risk analysis is an essential process in risk management, There is two kinds of the ris...
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2014
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/42857/ http://irep.iium.edu.my/42857/ http://irep.iium.edu.my/42857/1/42857.pdf |
id |
iium-42857 |
---|---|
recordtype |
eprints |
spelling |
iium-428572018-06-20T01:41:55Z http://irep.iium.edu.my/42857/ Security risk analysis used by Kuwait government sectors Al-Enezi , Khalid Abdulkareem Alshaikhli, Imad Fakhri Taha Alhatem, Khaled Al-kandari, Abdulrahman QA75 Electronic computers. Computer science Permanent use of computer in our daily lives has to be protect our personal information from any external threat, if cyber security is the solution to build a safe space greeting mail in government agencies. Risk analysis is an essential process in risk management, There is two kinds of the risk qualitative and quantitative. Survey was distributed to government entities in Kuwait to prove the main risk and how to secure the risk analysis, and business continuity plan. Was distributed to the employees who work in these sections in the government entities. and 90 replies, 74% of them are not penetrate their organization before - 69% of government agencies change the password automatically - 58% have a team to analyze security risks. To resolve the problem business continuity plan that cover and satisfies the requirements of all government entities in Kuwait, according to theoretical and statistical studies, hence ensuring the continuity of all e-services developed in Kuwait as part of the government project, provide a special budget to protect the security of information in all governmental entity. Inform the relevant staff of all that is new and all the developments in the field of information security. Increase educational programs flags on the importance of the security information. 2014-04-01 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/42857/1/42857.pdf Al-Enezi , Khalid Abdulkareem and Alshaikhli, Imad Fakhri Taha and Alhatem, Khaled and Al-kandari, Abdulrahman (2014) Security risk analysis used by Kuwait government sectors. In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014, 29-30 Dec 2014, Amman- Jordan. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7076867&tag=1 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Al-Enezi , Khalid Abdulkareem Alshaikhli, Imad Fakhri Taha Alhatem, Khaled Al-kandari, Abdulrahman Security risk analysis used by Kuwait government sectors |
description |
Permanent use of computer in our daily lives has to
be protect our personal information from any external threat,
if cyber security is the solution to build a safe space greeting
mail in government agencies.
Risk analysis is an essential process in risk management,
There is two kinds of the risk qualitative and quantitative.
Survey was distributed to government entities in Kuwait to
prove the main risk and how to secure the risk analysis, and
business continuity plan. Was distributed to the employees who
work in these sections in the government entities. and 90
replies, 74% of them are not penetrate their organization
before - 69% of government agencies change the password
automatically - 58% have a team to analyze security risks.
To resolve the problem business continuity plan that cover
and satisfies the requirements of all government entities in
Kuwait, according to theoretical and statistical studies, hence
ensuring the continuity of all e-services developed in Kuwait as
part of the government project, provide a special budget to
protect the security of information in all governmental entity.
Inform the relevant staff of all that is new and all the
developments in the field of information security. Increase
educational programs flags on the importance of the security
information. |
format |
Conference or Workshop Item |
author |
Al-Enezi , Khalid Abdulkareem Alshaikhli, Imad Fakhri Taha Alhatem, Khaled Al-kandari, Abdulrahman |
author_facet |
Al-Enezi , Khalid Abdulkareem Alshaikhli, Imad Fakhri Taha Alhatem, Khaled Al-kandari, Abdulrahman |
author_sort |
Al-Enezi , Khalid Abdulkareem |
title |
Security risk analysis used by Kuwait government sectors |
title_short |
Security risk analysis used by Kuwait government sectors |
title_full |
Security risk analysis used by Kuwait government sectors |
title_fullStr |
Security risk analysis used by Kuwait government sectors |
title_full_unstemmed |
Security risk analysis used by Kuwait government sectors |
title_sort |
security risk analysis used by kuwait government sectors |
publishDate |
2014 |
url |
http://irep.iium.edu.my/42857/ http://irep.iium.edu.my/42857/ http://irep.iium.edu.my/42857/1/42857.pdf |
first_indexed |
2023-09-18T21:01:04Z |
last_indexed |
2023-09-18T21:01:04Z |
_version_ |
1777410626936635392 |