Ethical Hacking in the Saudi Government Institutions
DOI:
https://doi.org/10.31686/ijier.vol3.iss10.448Keywords:
Information security, Ethical hacking, Computer EthicsAbstract
The Internet has become indispensable to governments by allowing them to conduct E-government, provide better citizen service, improve communications, and access needed information rapidly. While computer networks have revolutionized the way governmental institutions operate, the risks they introduce via interconnectivity can be devastating. Attacks on computer systems via the Internet can lead to lost money, time, reputation, and sensitive information. One reaction to this state of affairs is a behaviour termed “Ethical Hacking” which attempts to proactively increase security protection by indenturing and patching known security vulnerabilities on systems owned by other parties. The main purpose of this study is to address the problems related to the ethical hacking in governmental institutions in Saudi Arabia. The results show that there is a lack of awareness to issues of information security, and ethical hacking, Ethical hacking have a positive impact on the Saudi institutions, and most of ethical hacking problems in Saudi Arabia are related to senior management, staff, society and laws. More researches are needed to consider other measures and include other countries which may show different results.
References
Ajbaili,M. Saudi & UAE at high risk to cyber-crime: report, al-arabiya news,dubai,(2009).Available:http://www.alarabiya.net/articles/2009/11/15/91411.html
Baumann,R.Ethical hacking,(2002), Accessed:February15,2012.Available:http://www.giac.org/registration/gsec
Graves, K. CEH® Certified Ethical Hacker StudyGuide,Indianapolis: sybox& wily, (2010).
Jain, B, Ravi,K.Hacking- Ethical or Criminal-A Legal Quandary,The Icfai University Press, (2008).
JAMIL,D andALI KHAN,M.Is Ethical Hacking Ethical,International Journal of Engineering Science and Technology(IJEST), Vol .3 No.5. (2011),pp. 3758-3763.
Kraus,R.ISSA member,Ethical hacking from start to success, ISSA Journal,San antonio,USA, (2009),pp.14-18.
Krejcie,R and Morgan,D. Determining Sample Size For Research Activities, In Educational And Psychological Measurement. University of Minnesota,Texas A. & M. University, (1970) , pp.607-610. DOI: https://doi.org/10.1177/001316447003000308
Pondent, C. eHow Contributor The Advantages of Ethical Hacking Accessed:May7,2012. Available:http://www.ehow.com/info_8431442_advantages ethical-hacking.html
Reuters. Saudi Arabia says hackers sabotagegovernment websites,Al-arabiya news,Riyadh,KSA,(2013)Available:http://english.alarabiya.net/en/media/2013/05/18/Saudi-Arabia-says-hackers-sabotage-government-websites.html
Voutsa, A.E , Siakas,V. E , Nisioti ,S. K , and Ross, M, Survey of Informatics Students’ Awareness on Ethical Issues, The British Computer Society , (ISBN 1-902505-77-8). ( 2006), pp. 139-150.
Downloads
Published
Issue
Section
License
Copyright (c) 2015 Shaymaa Mousa, Wejdan Barashi
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
Copyrights for articles published in IJIER journals are retained by the authors, with first publication rights granted to the journal. The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author for more visit Copyright & License.