e-Business continuity and disaster recovery plan case study: Kuwait government entities (GEs)
cyber-attack is spyware devices through pernicious files to change logic data and computers code. That leads to distributive results that expose data for risk. Organizations have to define the risks and appraise their impact. Disaster recovery plan and business continuity plan are developed to...
| Main Authors: | Al-Enezi, Khaled Abdulkareem, Alshaikhli, Imad Fakhri Taha, Al-Kandari, Abdul Rahman, Al-Mutairi, Hessa Mutlaq |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
2013
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/37413/ http://irep.iium.edu.my/37413/1/imad-khalid.pdf http://irep.iium.edu.my/37413/4/37413_e-Business%20continuity%20and%20disaster%20recovery%20plan_SCOPUS.pdf |
Similar Items
Kuwait government entities e-business continuity and
disaster recovery plan
by: Alenezi, Khalid, et al.
Published: (2014)
by: Alenezi, Khalid, et al.
Published: (2014)
Security risk analysis used by Kuwait government sectors
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
CERT team involving GEs structured
by: Abdulkareem Alenezi, Khaled, et al.
Published: (2015)
by: Abdulkareem Alenezi, Khaled, et al.
Published: (2015)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
The influence of internet and social media on purchasing
decisions in Kuwait
by: Abdulkareem Al-Enezi, Khalid, et al.
Published: (2018)
by: Abdulkareem Al-Enezi, Khalid, et al.
Published: (2018)
A survey of intrusion detection system using case study Kuwait governments entiteis
by: Alenezi, Khalid, et al.
Published: (2014)
by: Alenezi, Khalid, et al.
Published: (2014)
Designing a smart city in Kuwait: an initial study
by: Alkandari, Abdulrahman, et al.
Published: (2012)
by: Alkandari, Abdulrahman, et al.
Published: (2012)
IT disaster recovery and business continuity based on VMware SRM solution for Kuwait Oil Company (KOC)
by: Alshammari, Mohammad Matar, et al.
Published: (2016)
by: Alshammari, Mohammad Matar, et al.
Published: (2016)
The influence of internet and social media on
purchasing decisions in Egypt and a comparison
between Egypt and Kuwait
by: Alenezi, Khalid Abdulkareem, et al.
Published: (2017)
by: Alenezi, Khalid Abdulkareem, et al.
Published: (2017)
Disaster recovery in single-cloud and multi-cloud
environments: Issues and challenges
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
Data recovery and business continuity in cloud computing: a review of the research literature
by: Alshammari, Mohammad M., et al.
Published: (2016)
by: Alshammari, Mohammad M., et al.
Published: (2016)
The influence of Internet and social media on purchasing
decisions in Indonesia and a comparison between
Indonesia and Kuwait
by: al-enizi, Khalid, et al.
Published: (2019)
by: al-enizi, Khalid, et al.
Published: (2019)
Enhancing lightweight block cipher algorithm OLBCA
through decreasing cost factor
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2015)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2015)
Disaster recovery and business continuity for database services in multi-cloud
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
Traffic management system based on wsn in Kuwait: an initial design
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Rational drug design using genetic algorithm: case of malaria disease
by: Al-Safi, Hassen Mohammed, et al.
Published: (2012)
by: Al-Safi, Hassen Mohammed, et al.
Published: (2012)
Brain & heart from computer science perspective
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
Scientific research in view of Quran and the creation of Allah s.w.t.
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
Scientific research in view of Quran and the creation of Allah s w t
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
Structure of research proposal
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
A practical method for the analysis of genetic algorithms
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
OLBCA: a new lightweight block cipher algorithm
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
Improving the security of LBlock lightweight algorithm using bit permutation
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
Improving PRESENT lightweight algorithms
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
On randomness of compressed data using non-parametric
randomness tests
by: Al-Khayyat, Kamal A., et al.
Published: (2018)
by: Al-Khayyat, Kamal A., et al.
Published: (2018)
Using pre-determined patterns to analyze the common behavior of compressed data and their compressibility apeal
by: Al-Khayyat, Kamal, et al.
Published: (2018)
by: Al-Khayyat, Kamal, et al.
Published: (2018)
Joux multicollisions attack in sponge construction
by: AlAhmad, Mohammad A., et al.
Published: (2013)
by: AlAhmad, Mohammad A., et al.
Published: (2013)
Dynamic linear feedback shift registers: a review
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Accident detection system and method for accident detection
by: Alkandari, Abdulrahman, et al.
Published: (2014)
by: Alkandari, Abdulrahman, et al.
Published: (2014)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
A review of steganographic methods and techniques
by: Beroual, Abdessalam, et al.
Published: (2018)
by: Beroual, Abdessalam, et al.
Published: (2018)
Dynamic fuzzy logic traffic light integrated system with accident detection and action
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Minimum capabilities and requirements for establishing a national cert for AGC
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Effectiveness and performance of e-government in Saudi Arabia
by: Taha Alshaikhli, Haifa, et al.
Published: (2017)
by: Taha Alshaikhli, Haifa, et al.
Published: (2017)
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017)
by: Alahmad, Mohammad, et al.
Published: (2017)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
An improved genetic algorithm for solving the multiprocessor scheduling problem
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Comparative study on 4G/LTE cryptographic algorithms based on different factors
by: Ghanim, Alyaa, et al.
Published: (2014)
by: Ghanim, Alyaa, et al.
Published: (2014)
Similar Items
-
Kuwait government entities e-business continuity and
disaster recovery plan
by: Alenezi, Khalid, et al.
Published: (2014) -
Security risk analysis used by Kuwait government sectors
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014) -
CERT team involving GEs structured
by: Abdulkareem Alenezi, Khaled, et al.
Published: (2015) -
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014) -
The influence of internet and social media on purchasing
decisions in Kuwait
by: Abdulkareem Al-Enezi, Khalid, et al.
Published: (2018)