Ethical Hacking in the Saudi Government Institutions

Authors

  • Shaymaa Mousa King Abdulaziz University, Saudi Arabia
  • Wejdan Barashi King Abdulaziz University

DOI:

https://doi.org/10.31686/ijier.vol3.iss10.448

Keywords:

Information security, Ethical hacking, Computer Ethics

Abstract

The Internet has become indispensable to governments by allowing them to conduct E-government, provide better citizen service, improve communications, and access needed information rapidly. While computer networks have revolutionized the way governmental institutions operate, the risks they introduce via interconnectivity can be devastating. Attacks on computer systems via the Internet can lead to lost money, time, reputation, and sensitive information. One reaction to this state of affairs is a behaviour termed “Ethical Hacking” which attempts to proactively increase security protection by indenturing and patching known security vulnerabilities on systems owned by other parties. The main purpose of this study is to address the problems related to the ethical hacking in governmental institutions in Saudi Arabia. The results show that there is a lack of awareness to issues of information security, and ethical hacking, Ethical hacking have a positive impact on the Saudi institutions, and most of ethical hacking problems in Saudi Arabia are related to senior management, staff, society and laws. More researches are needed to consider other measures and include other countries which may show different results.

Downloads

Download data is not yet available.

Author Biographies

  • Shaymaa Mousa, King Abdulaziz University, Saudi Arabia

    Business and Administration Faculty

  • Wejdan Barashi, King Abdulaziz University

    Business and Administration Faculty

References

Ajbaili,M. Saudi & UAE at high risk to cyber-crime: report, al-arabiya news,dubai,(2009).Available:http://www.alarabiya.net/articles/2009/11/15/91411.html

Baumann,R.Ethical hacking,(2002), Accessed:February15,2012.Available:http://www.giac.org/registration/gsec

Graves, K. CEH® Certified Ethical Hacker StudyGuide,Indianapolis: sybox& wily, (2010).

Jain, B, Ravi,K.Hacking- Ethical or Criminal-A Legal Quandary,The Icfai University Press, (2008).

JAMIL,D andALI KHAN,M.Is Ethical Hacking Ethical,International Journal of Engineering Science and Technology(IJEST), Vol .3 No.5. (2011),pp. 3758-3763.

Kraus,R.ISSA member,Ethical hacking from start to success, ISSA Journal,San antonio,USA, (2009),pp.14-18.

Krejcie,R and Morgan,D. Determining Sample Size For Research Activities, In Educational And Psychological Measurement. University of Minnesota,Texas A. & M. University, (1970) , pp.607-610. DOI: https://doi.org/10.1177/001316447003000308

Pondent, C. eHow Contributor The Advantages of Ethical Hacking Accessed:May7,2012. Available:http://www.ehow.com/info_8431442_advantages ethical-hacking.html

Reuters. Saudi Arabia says hackers sabotagegovernment websites,Al-arabiya news,Riyadh,KSA,(2013)Available:http://english.alarabiya.net/en/media/2013/05/18/Saudi-Arabia-says-hackers-sabotage-government-websites.html

Voutsa, A.E , Siakas,V. E , Nisioti ,S. K , and Ross, M, Survey of Informatics Students’ Awareness on Ethical Issues, The British Computer Society , (ISBN 1-902505-77-8). ( 2006), pp. 139-150.

Downloads

Published

2015-10-01

How to Cite

Mousa, S., & Barashi, W. . (2015). Ethical Hacking in the Saudi Government Institutions. International Journal for Innovation Education and Research, 3(10), 74-86. https://doi.org/10.31686/ijier.vol3.iss10.448