Saudi Universities Theses & Dissertations
Permanent URI for this communityhttps://drepo.sdl.edu.sa/handle/20.500.14154/11
Browse
3 results
Search Results
Item Restricted أهمية اضافة الأمن السيبراني لمناهج المحاسبة: دراسة تطبيقية على الجامعات السعودية Importance of Adding Cybersecurity to Accounting Curricula: An Applied Study on Saudi Universities(Qassim University, 2024) Almutairi, Norah; Elnafabi, Husseinفي العصر التكنولوجي الحالي، من الضروري استكمال مناهج المحاسبة لمواكبة تطورات المهنة. كان الهدف من هذه الدراسة هو تقييم مدى أهمية إضافة الأمن السيبراني لمناهج المحاسبة. تم تقديم استطلاع عبر الإنترنت لجمع البيانات الأولية. تم الحصول على ردود من 122 مشار كاً يمثلون أعضاء هيئة التدريس في أقسام المحاسبة في الجامعات السعودية، واستخدمت طرق إحصائية متعددة لتحليل البيانات ومعرفة العلاقة بين المتغيرات في نموذج الدراسة. تظهر النتائج أنه من المهم إضافة الأمن السيبراني في مناهج المحاسبة. تشير هذه النتائج إلى أنه من غير الواضح إلى أي مدى يكون طلاب المحاسبة مؤهلين حالياً للعمل مع أساسيات الأمن السيبراني. كما تشير النتائج إلى أن المعرفة بالأمن السيبراني تزيد من القدرة التنافسية لخريجي المحاسبة. كما عرضت النتائج أكثر الصعوبات التي تواجه أقسام المحاسبة عند إضافة منهج الأمن السيبراني والتي تتمثل في قلة المراجع المتاحة لتدريس الأمن السيبراني في مناهج المحاسبة، بعض أعضاء هيئة التدريس لا يعرفون أهمية الأمن السيبراني، ويصعب توفير أعضاء هيئة تدريس مؤهلين لتدر يس الأمن السيبراني في أقسام المحاسبة. بناءً على هذه النتائج، تم تحديد اقتراحات للبحث في المستقبل.139 0Item Restricted Attack and Defense Modeling Against DDoS Attacks in Industrial SCADA System Using Machine Learning(Saudi Digital Library) Aldahasi, Ezaz Mohammed SaadSCADA systems are monitoring and controlling critical infrastructures such as power generation, water supply, transportation networks, and manufacturing facilities. In order to ensure those critical infrastructures protection, it is necessary to understand all the ways in which the systems can be attacked and adopted a viewpoint similar to an attacker for determining weaknesses and hiatus in defenses. In fact, SCADA systems are very attractive targets for many malicious attacks. Many factors contributed to the increased risk of modern control systems, including network infrastructure, poor configurations, lack of skilled people, and reliance on standard technologies with a number of known vulnerabilities that are exploited by the attackers. The aim of this thesis is to investigate malicious attacks affecting the security of SCADA systems. The main focus is made on the DoS and DDoS attacks which have become a real threat to the functions of SCADA systems in a normal way. We have developed an attack tree for SCADA systems providing the possible routes for the attackers to disrupt the systems. We have contributed in developing attack and defence modelling for SCADA systems. We have worked on detecting DoS and DDoS attacks on SCADA systems and provided recommendations to avoid those harmful attacks. We have used the Honeypot approach to detect DoS and DDoS attacks on SCADA systems. In addition, some machine learning techniques have been applied to find alternatives for detecting such type of attacks The proposed model proves to be good as our experimental results produce an accuracy of 99.9117 0Item Restricted LIGHTWEIGHT BLOCKCHAIN TO SECURE COMMUNICATION IN INTERNET OF THINGS (IOT)(Saudi Digital Library, 2021) Alfrhan, Aishah Abdullah; Moulahi, TarekOver the last few years, there has been a great interest in the Internet of Things (IoT). This is mainly because the IoT interacts directly with people’s everyday lives in critical applications, such as in smart homes and healthcare applications. In contrast, IoT devices typically have a resource-constrained architecture, rendering them vulnerable to cyberattacks. Accordingly, things need to be secured either at rest, in motion, or in use to build a secure trusted system through lightweight and energy efficient security solutions, which have been identified as the main challenge facing adoption of IoT systems. To address this problem, a disruptive technology (blockchain) has been foreseen by the industry and research community as being able to deliver secure, fast, reliable, and transparent solutions for IoT systems. Hence, this work investigates the adoption of lightweight blockchain technology, mainly as a method of securing IoT systems. Because hashing plays a major role in creating a robust blockchain structure, we select a number of different hash techniques to be executed on a Raspberry Pi device. In summation, this work provides a numerical study to evaluate the performance of well-known hash functions that can be used for lightweight blockchain-based IoT.39 0