Main Article Content
The Internet has become indispensable to governments by allowing them to conduct E-government, provide better citizen service, improve communications, and access needed information rapidly. While computer networks have revolutionized the way governmental institutions operate, the risks they introduce via interconnectivity can be devastating. Attacks on computer systems via the Internet can lead to lost money, time, reputation, and sensitive information. One reaction to this state of affairs is a behaviour termed â€œEthical Hackingâ€ which attempts to proactively increase security protection by indenturing and patching known security vulnerabilities on systems owned by other parties. The main purpose of this study is to address the problems related to the ethical hacking in governmental institutions in Saudi Arabia. The results show that there is a lack of awareness to issues of information security, and ethical hacking, Ethical hacking have a positive impact on the Saudi institutions, and most of ethical hacking problems in Saudi Arabia are related to senior management, staff, society and laws. More researches are needed to consider other measures and include other countries which may show different results.
This work is licensed under a Creative Commons Attribution 4.0 International License.
Submission of an article implies that the work described has not been published previously (except in the form of an abstract or as part of a published lecture or academic thesis), that it is not under consideration for publication elsewhere, that its publication is approved by all authors and tacitly or explicitly by the responsible authorities where the work was carried out, and that, if accepted, will not be published elsewhere in the same form, in English or in any other language, without the written consent of the Publisher. The Editors reserve the right to edit or otherwise alter all contributions, but authors will receive proofs for approval before publication.
Copyrights for articles published in IJIER journals are retained by the authors, with first publication rights granted to the journal. The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.
 Baumann,R.Ethical hacking,(2002), Accessed:February15,2012.Available:http://www.giac.org/registration/gsec
 Graves, K. CEHÂ® Certified Ethical Hacker StudyGuide,Indianapolis: sybox& wily, (2010).
 Jain, B, Ravi,K.Hacking- Ethical or Criminal-A Legal Quandary,The Icfai University Press, (2008).
 JAMIL,D andALI KHAN,M.Is Ethical Hacking Ethical,International Journal of Engineering Science and Technology(IJEST), Vol .3 No.5. (2011),pp. 3758-3763.
 Kraus,R.ISSA member,Ethical hacking from start to success, ISSA Journal,San antonio,USA, (2009),pp.14-18.
 Krejcie,R and Morgan,D. Determining Sample Size For Research Activities, In Educational And Psychological Measurement. University of Minnesota,Texas A. & M. University, (1970) , pp.607-610.
Pondent, C. eHow Contributor The Advantages of Ethical Hacking Accessed:May7,2012. Available:http://www.ehow.com/info_8431442_advantages ethical-hacking.html
 Reuters. Saudi Arabia says hackers sabotagegovernment websites,Al-arabiya news,Riyadh,KSA,(2013)Available:http://english.alarabiya.net/en/media/2013/05/18/Saudi-Arabia-says-hackers-sabotage-government-websites.html
 Voutsa, A.E , Siakas,V. E , Nisioti ,S. K , and Ross, M, Survey of Informatics Studentsâ€™ Awareness on Ethical Issues, The British Computer Society , (ISBN 1-902505-77-8). ( 2006), pp. 139-150.