Security risk analysis used by Kuwait government sectors
Permanent use of computer in our daily lives has to be protect our personal information from any external threat, if cyber security is the solution to build a safe space greeting mail in government agencies. Risk analysis is an essential process in risk management, There is two kinds of the ris...
| Main Authors: | , , , |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/42857/ http://irep.iium.edu.my/42857/1/42857.pdf |
| _version_ | 1848782343354974208 |
|---|---|
| author | Al-Enezi , Khalid Abdulkareem Alshaikhli, Imad Fakhri Taha Alhatem, Khaled Al-kandari, Abdulrahman |
| author_facet | Al-Enezi , Khalid Abdulkareem Alshaikhli, Imad Fakhri Taha Alhatem, Khaled Al-kandari, Abdulrahman |
| author_sort | Al-Enezi , Khalid Abdulkareem |
| building | IIUM Repository |
| collection | Online Access |
| description | Permanent use of computer in our daily lives has to
be protect our personal information from any external threat,
if cyber security is the solution to build a safe space greeting
mail in government agencies.
Risk analysis is an essential process in risk management,
There is two kinds of the risk qualitative and quantitative.
Survey was distributed to government entities in Kuwait to
prove the main risk and how to secure the risk analysis, and
business continuity plan. Was distributed to the employees who
work in these sections in the government entities. and 90
replies, 74% of them are not penetrate their organization
before - 69% of government agencies change the password
automatically - 58% have a team to analyze security risks.
To resolve the problem business continuity plan that cover
and satisfies the requirements of all government entities in
Kuwait, according to theoretical and statistical studies, hence
ensuring the continuity of all e-services developed in Kuwait as
part of the government project, provide a special budget to
protect the security of information in all governmental entity.
Inform the relevant staff of all that is new and all the
developments in the field of information security. Increase
educational programs flags on the importance of the security
information. |
| first_indexed | 2025-11-14T16:03:57Z |
| format | Proceeding Paper |
| id | iium-42857 |
| institution | International Islamic University Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-14T16:03:57Z |
| publishDate | 2014 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | iium-428572018-06-20T01:41:55Z http://irep.iium.edu.my/42857/ Security risk analysis used by Kuwait government sectors Al-Enezi , Khalid Abdulkareem Alshaikhli, Imad Fakhri Taha Alhatem, Khaled Al-kandari, Abdulrahman QA75 Electronic computers. Computer science Permanent use of computer in our daily lives has to be protect our personal information from any external threat, if cyber security is the solution to build a safe space greeting mail in government agencies. Risk analysis is an essential process in risk management, There is two kinds of the risk qualitative and quantitative. Survey was distributed to government entities in Kuwait to prove the main risk and how to secure the risk analysis, and business continuity plan. Was distributed to the employees who work in these sections in the government entities. and 90 replies, 74% of them are not penetrate their organization before - 69% of government agencies change the password automatically - 58% have a team to analyze security risks. To resolve the problem business continuity plan that cover and satisfies the requirements of all government entities in Kuwait, according to theoretical and statistical studies, hence ensuring the continuity of all e-services developed in Kuwait as part of the government project, provide a special budget to protect the security of information in all governmental entity. Inform the relevant staff of all that is new and all the developments in the field of information security. Increase educational programs flags on the importance of the security information. 2014-04-01 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/42857/1/42857.pdf Al-Enezi , Khalid Abdulkareem and Alshaikhli, Imad Fakhri Taha and Alhatem, Khaled and Al-kandari, Abdulrahman (2014) Security risk analysis used by Kuwait government sectors. In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014, 29-30 Dec 2014, Amman- Jordan. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7076867&tag=1 |
| spellingShingle | QA75 Electronic computers. Computer science Al-Enezi , Khalid Abdulkareem Alshaikhli, Imad Fakhri Taha Alhatem, Khaled Al-kandari, Abdulrahman Security risk analysis used by Kuwait government sectors |
| title | Security risk analysis used by Kuwait government sectors |
| title_full | Security risk analysis used by Kuwait government sectors |
| title_fullStr | Security risk analysis used by Kuwait government sectors |
| title_full_unstemmed | Security risk analysis used by Kuwait government sectors |
| title_short | Security risk analysis used by Kuwait government sectors |
| title_sort | security risk analysis used by kuwait government sectors |
| topic | QA75 Electronic computers. Computer science |
| url | http://irep.iium.edu.my/42857/ http://irep.iium.edu.my/42857/ http://irep.iium.edu.my/42857/1/42857.pdf |