Abstract :
Cybercrime prevention is critical issue nowadays in Saudi Arabia. Saudi Arabia is no different from anywhere else in the world when comes to cyber crimes. It exposed to several types of cybercrimes which was classified in the report to five categories depend on targeted audience. There are no effective solutions resolve those crimes because of several challenges faced by all countries without exception which mentioned in this report. The report display proposed solutions to deal with that challenges. Saudi Arabia was exposed to many of the attacks over years.The most popular attack was Shamoon, which attacked the country two time over four years, which targeted companies and ministries active in the state as Saudi Aramco that
…show more content…
Moreover, electronic services help people to do their work in easier way without any type of effort. Also, it reduce wasting time. However, there are problems appeared all around the world is cyber-crime, the criminal steal information, destroy devices and but victims in trouble financial problems.Saudi Arabia one of countries which benefited from the advantages of the Internet and was harmed by its disadvantages .This report discuss the harms and crimes that come from cyberspace which was suffered by Saudi Arabia and how saudi government face …show more content…
https://books.google.com.sa/books?hl=ar&lr=&id=-BsTixXQp08C&oi=fnd&pg=PP2&dq=what+is+spyware+in+computer&ots=GhdI6AWCsr&sig=PLY-DbTjOZfUIiIlpKvttCwsmCQ&redir_esc=y#v=onepage&q=what%20is%20spyware%20in%20computer&f=false
2.5 crime against information Ransomware
It is malicious software act as a virus, criminal use this type of software to prevent the user to reach his information by encrypting information to force user pay to replay his information . http://www.thewindowsclub.com/types-cybercrime
DDoS attacks
Denali of services are come when hacker breach a lot of pcs and control it all, then this pcs name become botnet. Criminal use this botnet by sending a lot of massages at the same time to the server or pcs to down the service and stop it from work. http://www.thewindowsclub.com/types-cybercrime Spam and Phishing the problem come usually from email when the user open email message from untrusted sender ,open un known link that make devices vulnerable.
Such mistakes or scenarios can be stopped with proper training and education on significant threats and vulnerabilities. End users usually do not follow best practices and security guidelines. Much attention is not paid to spam emails, malwares, viruses and even phishing emails. Users need to be educated on the significance of protecting they’re data on vulnerable networks and administrators need to secure the networks with proper tools, training and
Access Issues 2. Mitigating risk 3. Messaging security 4. Corrupt Data 5.
4. Improved security-0 since there is no support for XP anymore, continuing to use will show that you are vulnerable to threats. How to update Windows XP to Windows 10 To install the Windows 10 Home or Professional on your machine running Windows XP, you can choose between a digital download and a physical disc. Currently, it is not clear whether the downloaded version can be run directly from with the Windows XP.
Osama bin Laden and Khalid Sheikh Mohammed were responsible for plotting 9/11. Khalid Sheik Mohammed was the 9/11 operational commander who initially planned an attack on the United States, which involved hijacking ten planes which were to be flown into buildings on both the west and east coasts. Osama bin laden attacked the United States because of his hatred for the US and his yearning for revenge against the US. Bin Laden was motivated by the belief that the “Islamic world has been tasting [humiliation and degradation] for 80 years” by Western powers (27). For example, Saudi Arabia rejected Osama bin Laden’s offer to deploy his army to defend Saudi Arabia from Saddam Hussein’s invasion; instead, the Saudis sought the protection of the United
The government changed the security measures by investigating more terrorism attacks, antiterrorism training program, and eventually creating the terrorism death
Many were wondering who planned these attacks and why. Al-Qaeda terrorists from the Islamic state took credit for the well-orchestrated plan. The attack made by these individuals
“Wahhabism explosive growth began in the 1970s, when Saudi charities started funding Wahhabi schools…” (Doc 4) The Saudi government funding Wahhabi schools was a crucial part to Wahhabism gaining support and becoming a powerful branch of Islam. These Wahhabi schools created a new generation of Wahhabi Muslims. These schools made the children into hardcore Wahhabists and therefore made it a much stronger religion in Saudi Arabia and the rest of the Muslim world.
The first ever hijacking was in Peru in 1931 (Hijacking, n.p.) and the first US Hijacking was on May 1, 1961 when a florida-bound plane was taken to Cuba (Hijacking, n.p.) Another attack on the twin towers before 9/11 occurred on 2/26/1993 when a bomb was placed in the back of a van and driven to the base of the Twin Towers and exploded, about 6 people were killed, but thousands were injured (Langley, 42). The government ignored warnings when Al-Qaeda leader, Osama Bin Laden, had made a statement on the subject of using aircraft in an attack against the US but it wasn’t taken seriously(Langley, 69).There were 19 hijackers in total, 5 being in each plane except for the one that crashed into Pennsylvania which had 4 hijackers in it (Langley, 20) AA Flight 11 was the plane that hit the northern tower
the purpose of the attack was to hurt the united states, because the terrorist group al-qaeda hates the fact that the united states has freedom and the democracy and afghanistan, where al-qaeda is located, does not. The al-qaeda group felt that if they cannot have freedom than no one should have freedom. The result of the attack only created a religious intolerance and injustice for muslims, that made people think that all muslims were terrorists and that they should be punished. I do believe that al-qaeda should be punished, but al-qaeda has nothing to do with the muslims community, or muslims beliefs, but still muslims have been discriminated against and treated unfairly because people do not have a knowledge of who committed the attack, and in general people have an intolerance for people that are
“Black Code: Surveillance, Privacy, and the Dark Side of the Internet,” written by Ronald J. Deibert, outlines different issues and benefits that have arised due to the growing use of the internet. Deibert begins his essay providing information about the internet such as the rapid growth of smartphones, how the internet has taken over most of societies lives, and key differences between previous technological innovations compared to the internet. He continues his essay by discussing the U.S.A. Patriot Act and how this law should be retracted based on the fact that various companies, like Google, can give the government our personal searches if they ask. Then, he talks about various types of cyber crimes and how we need stronger regulations to control the internet so these crimes would not be possible. Deibert concludes his essay explaining how the internet has provided many benefits in today’s nation, but the internet needs stricter regulations for our own protection.
In 2001, 19 militants associated with al-Qaeda planned and staged the September 11th attacks in New York City. Prior to the September 11th attacks, the group had been linked to several more attacks including attacks in Kenya, Saudi Arabia, Indonesia, Turkey, Algeria, Israel, the United Kingdom, and many more places. (The Editors of Encyclopedia Britannica 2) All of these attacks trace back to the main mastermind of the group: Bin Laden. He attacked so many more places besides the U.S. which shows his overall threat to the whole world.
1. Viruses Can destroy all of the data and erase all of the file or misused by the attacker. Have the anti-virus downloaded in your computer and make sure your computer is completely updated. 2. Phishing Attacker will be able to get the private information of the person and will gain access on computer Be able to recognize the fake emails from the attacker and avoid opening them up.
Censorship is used to keep information away from citizens that can be used against the government and make them look bad. Saudi Arabia is one of the most censored countries in the world. Books, newspapers, magazines, broadcast media and Internet access are all censored in Saudi Arabia. You cannot say blasphemy about the royal family or Islam in Saudi Arabia, or else there will be punishment, just like in Oceania how one cannot say anything against Big Brother. In 2014 Saudi Arabian writer Raif Badawi was sentenced to 10 years in prison and 1000 lashes for insulting Islam.
Strengths: The major strength of The kingdom of Saudi Arabia relies heavily on its strategic location. As it is the birthplace of prophet Mohammed and the birth of Islam, it has great antiques and history that is appreciated by Arabs, Muslims and everyone around the world, as the history of the Arab peninsula goes back to more than 1400 years. This provides tons of historic information and antiques that will attract tourists around the world. Another strength is the constant visits from Muslims throughout the year, which will motivate the Saudi government to be on a constant road to development to provide ease for visitors when performing religious rituals.
there exists a preferential bias for Saudi nationals in matters of employment and business. There has been a tremendous growth in GDP due to rise in revenues from oil as a quarter of the world 's oil reserves are in Saudi Arabia. There is a demand for taking measures and effective implementation towards environment regulations. The identification of major weaknesses and the government’s measures for them is helping towards the transformation of Saudi Arabia into a developed nation with a diversification of