Saudi Cultural Missions Theses & Dissertations

Permanent URI for this communityhttps://drepo.sdl.edu.sa/handle/20.500.14154/10

Browse

Search Results

Now showing 1 - 2 of 2
  • ItemRestricted
    Assessing and Addressing Social Engineering Attacks
    (Saudi Digital Library, 2025-06-17) Aljabri, Abdulrahman Jubran H; Alyamani, Abdulghani
    In recent years, phishing scams have become one of the most common methods used to target individuals, affecting millions of users globally every year. Cybercriminals now use multiple platforms such as social media, text messages, emails, and voice calls to target victims. Thus, Attackers play on emotions like fear, urgency, or curiosity to pressure people into acting quickly without thinking. This study looked at why people fall for these scams. By surveying 123 participants, we discovered gaps in how people spot phishing attempts and what makes some more vulnerable than others. The outcomes provide evidence-based recommendations for mitigating phishing threats, equipping institutions and governance bodies with recommendations to enhance public resilience against phishing attacks.
    6 0
  • Thumbnail Image
    ItemRestricted
    The Impact of Internal Threats on Saudi Arabia Government and Companies
    (Saudi Digital Library, 2023-11-01) Alshammari, Saddam; Rezaeifar, Zeinab
    The government of the Kingdom of Saudi Arabia is very interested in its cyber security, spending significant amounts of money on protecting its data and attracting cyber security experts to face the challenges and violations that are increasing daily. The Kingdom has achieved great superiority in protecting its data against external attacks and has responded to them successfully, in addition to being one of the most prominent countries around the world that has achieved high ranks in innovations in programs, methods and solutions that have contributed to enhancing cyber security in the Kingdom. However, the most severe violations that affected the government and companies of Saudi Arabia were due to internal threats through employees or contractors, which is not what often comes to mind. Nevertheless, Detection of internal threats is complex because it is not only related to the use of technology but depends on people and their motives and different ways to carry out attacks, which makes technical solutions insufficient to address this dilemma. In this work, we focus on studying the psychological and behavioral factors that fuel the motives for executing internal attacks. We measure the impact of these attacks on critical systems and financial losses in Saudi Arabia. Additionally, we will discuss how Saudi Arabia addressed these threats.
    36 0

Copyright owned by the Saudi Digital Library (SDL) © 2025