Cyber-attacks detection & protection in Kuwait government sectors

The world nowadays has witnessed a lot of crimes of cyber-attacks where many people suffered from many hackers who tried to steal important information or damage the programs found in the computers of victims. There has become necessity for companies to have different systems for protection. Ma...

Full description

Bibliographic Details
Main Authors: Alshaikhli, Imad Fakhri Taha, Al-Enezi , Khalid Abdulkareem, Al-kandari, Abdulrahman, Mahmood Al Dabbagh, Sufyan Salim
Format: Proceeding Paper
Language:English
Published: 2014
Subjects:
Online Access:http://irep.iium.edu.my/42858/
http://irep.iium.edu.my/42858/1/07076868.pdf
_version_ 1848782343630749696
author Alshaikhli, Imad Fakhri Taha
Al-Enezi , Khalid Abdulkareem
Al-kandari, Abdulrahman
Mahmood Al Dabbagh, Sufyan Salim
author_facet Alshaikhli, Imad Fakhri Taha
Al-Enezi , Khalid Abdulkareem
Al-kandari, Abdulrahman
Mahmood Al Dabbagh, Sufyan Salim
author_sort Alshaikhli, Imad Fakhri Taha
building IIUM Repository
collection Online Access
description The world nowadays has witnessed a lot of crimes of cyber-attacks where many people suffered from many hackers who tried to steal important information or damage the programs found in the computers of victims. There has become necessity for companies to have different systems for protection. Many companies have been specialized in having systems for protection of these risks of hackers. Process of protection from cyber-attacks can be identified based on three main steps; reactive services, proactive services and security quality management. Such issues will be discussed in this research to help companies identify different risks against their computer systems to put an end to such attacks.
first_indexed 2025-11-14T16:03:57Z
format Proceeding Paper
id iium-42858
institution International Islamic University Malaysia
institution_category Local University
language English
last_indexed 2025-11-14T16:03:57Z
publishDate 2014
recordtype eprints
repository_type Digital Repository
spelling iium-428582018-06-20T01:35:02Z http://irep.iium.edu.my/42858/ Cyber-attacks detection & protection in Kuwait government sectors Alshaikhli, Imad Fakhri Taha Al-Enezi , Khalid Abdulkareem Al-kandari, Abdulrahman Mahmood Al Dabbagh, Sufyan Salim QA75 Electronic computers. Computer science The world nowadays has witnessed a lot of crimes of cyber-attacks where many people suffered from many hackers who tried to steal important information or damage the programs found in the computers of victims. There has become necessity for companies to have different systems for protection. Many companies have been specialized in having systems for protection of these risks of hackers. Process of protection from cyber-attacks can be identified based on three main steps; reactive services, proactive services and security quality management. Such issues will be discussed in this research to help companies identify different risks against their computer systems to put an end to such attacks. 2014-04-01 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/42858/1/07076868.pdf Alshaikhli, Imad Fakhri Taha and Al-Enezi , Khalid Abdulkareem and Al-kandari, Abdulrahman and Mahmood Al Dabbagh, Sufyan Salim (2014) Cyber-attacks detection & protection in Kuwait government sectors. In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014, 29-30 Dec 2014, Amman- Jordan. http://unitech-kl.com/acsat/
spellingShingle QA75 Electronic computers. Computer science
Alshaikhli, Imad Fakhri Taha
Al-Enezi , Khalid Abdulkareem
Al-kandari, Abdulrahman
Mahmood Al Dabbagh, Sufyan Salim
Cyber-attacks detection & protection in Kuwait government sectors
title Cyber-attacks detection & protection in Kuwait government sectors
title_full Cyber-attacks detection & protection in Kuwait government sectors
title_fullStr Cyber-attacks detection & protection in Kuwait government sectors
title_full_unstemmed Cyber-attacks detection & protection in Kuwait government sectors
title_short Cyber-attacks detection & protection in Kuwait government sectors
title_sort cyber-attacks detection & protection in kuwait government sectors
topic QA75 Electronic computers. Computer science
url http://irep.iium.edu.my/42858/
http://irep.iium.edu.my/42858/
http://irep.iium.edu.my/42858/1/07076868.pdf