• DocumentCode
    3584655
  • Title

    Cyber-Attacks Detection & Protection in Kuwait Government Sectors

  • Author

    Al-Enezi, Khalid Abdulkareem ; Al-Shaikhli, Imad Fakhri ; Al-Kandari, Abdul Rahman ; Aldabbagh, Sufyan Salim Mahmood

  • Author_Institution
    Comput. Sci. Dept., Int. Islamic Univ. of Malaysia, Kuala Lumpur, Malaysia
  • fYear
    2014
  • Firstpage
    50
  • Lastpage
    55
  • Abstract
    The world nowadays has witnessed a lot of crimes of cyber-attacks where many people suffered from many hackers who tried to steal important information or damage the programs found in the computers of victims. There has become necessity for companies to have different systems for protection. Many companies have been specialized in having systems for protection of these risks of hackers. Process of protection from cyber-attacks can be identified based on three main steps, reactive services, proactive services and security quality management. Such issues will be discussed in this research to help companies identify different risks against their computer systems to put an end to such attacks.
  • Keywords
    computer crime; data protection; government data processing; Kuwait government sectors; cyberattack detection; cyberattack protection; hackers; proactive services; reactive services; security quality management; Companies; Computer hacking; Computers; Information systems; Quality management; Artifact Response Coordination; Artifact removal techniques; Artifact response; CSIRT; Cyber Attacks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Advanced Computer Science Applications and Technologies (ACSAT), 2014 3rd International Conference on
  • Type

    conf

  • DOI
    10.1109/ACSAT.2014.16
  • Filename
    7076868