SACM - United Kingdom

Permanent URI for this collectionhttps://drepo.sdl.edu.sa/handle/20.500.14154/9667

Browse

Search Results

Now showing 1 - 3 of 3
  • Thumbnail Image
    ItemRestricted
    Social engineering on cybersecurity
    (University of Portsmouth, 2024-05-20) jalban, Saad; Adamos, Vasileos
    Social engineering exploits weaknesses to steal sensitive data from people and corporations. This research examines social engineering methods, effective prevention, awareness campaigns, and resource management. The research analyses social engineering attacks and responses using a comprehensive literature review and expert and survey data. Important findings show that phishing, pretexting, and baiting are common social engineering methods, emphasising the necessity for robust prevention. Staff training, practice runs, and cutting-edge cybersecurity software may prevent intrusions. Interactive training modules, cybersecurity technologies, and regular information about emerging risks are the greatest ways to reduce social engineering assaults. Open-source technology, sector cooperation, and innovative finance may help overcome resource constraints. This research helps business
    28 0
  • Thumbnail Image
    ItemRestricted
    Strategic Integration of Cyber Deterrence and Cyber Defense Mechanisms: A Holistic Approach to Safeguarding National Cybersecurity
    (King's College London, 2023-09-01) Alqahtani, Abdulkarim Saad Hussain; Martin, Susan
    The objec-ves of this research included studying the effectiveness of the different cyber deterrence theories in protecting national security, understanding the mechanism of action of cyber deterrence and cyber defense strategies, and the role of technology in cyber deterrence and cyber defense. This research has been carried out as secondary research. In this case, previous literature was studied to answer the research question. It is a research that followed pragmatism research philosophy and, thus, focused on the practical approach to answering the research ques-on. This study has proved that cyber deterrence theories alone are effective only to some extent when it comes to protecting state security. The study has shown that cyber deterrence theories offer a passive approach to national security protection. They work best when the cyber defense strategies and mechanisms relying on the latest technology provide an active approach towards mitigating any cyberaSack. The mechanism of action in both these cases is different. The cyber deterrence theories act passively by deterring the aSackers, while the cyber defense strategies are aggressive, focusing on mitigating any cyberaSack whenever that happens. Also, this study has shown that there is a very significant role that technology has to play in ensuring national security.
    54 0
  • Thumbnail Image
    ItemRestricted
    Cybersecurity Conflict Between Saudi Arabia and Iran
    (Saudi Digital Library, 2023-11-06) Almunef, Abdulwahab; Robson, Martin
    The cybersecurity conflict between Iran and Saudi Arabia lacks comprehensive research on the evolving strategies and tools employed, despite its significant challenges and threats to regional stability and critical infrastructure. Therefore, this study aims to explore the nature of the cybersecurity conflict between Iran and Saudi Arabia, offering valuable insights into the tactics, features, and complexities of their respective cyber operations. A secondary research approach is employed in examining the current study phenomenon, where data is comprehensively gathered from reputable sources, including academic journals, reports, and credible online databases. Through an empirical analysis of the collected data, the study gains valuable insights into the historical context, vital underlying factors, types of cyber-attacks, and more characteristics of the cyber operations in the Iran-Saudi Arabia cyber conflict. Through this exploration, the current study contributes to the broader field of cybersecurity, equipping policymakers and relevant stakeholders with valuable knowledge to effectively address and resolve ongoing cyber warfare.
    44 0

Copyright owned by the Saudi Digital Library (SDL) © 2025