Ethical Hacking in the Saudi Government Institutions

Main Article Content

Shaymaa Mousa

Abstract

The Internet has become indispensable to governments by allowing them to conduct E-government, provide better citizen service, improve communications, and access needed information rapidly. While computer networks have revolutionized the way governmental institutions operate, the risks they introduce via interconnectivity can be devastating. Attacks on computer systems via the Internet can lead to lost money, time, reputation, and sensitive information. One reaction to this state of affairs is a behaviour termed “Ethical Hacking†which attempts to proactively increase security protection by indenturing and patching known security vulnerabilities on systems owned by other parties. The main purpose of this study is to address the problems related to the ethical hacking in governmental institutions in Saudi Arabia. The results show that there is a lack of awareness to issues of information security, and ethical hacking, Ethical hacking have a positive impact on the Saudi institutions, and most of ethical hacking problems in Saudi Arabia are related to senior management, staff, society and laws. More researches are needed to consider other measures and include other countries which may show different results.

Downloads

Download data is not yet available.

Article Details

How to Cite
Mousa, S. (2015). Ethical Hacking in the Saudi Government Institutions. International Journal for Innovation Education and Research, 3(10). Retrieved from http://ijier.net/ijier/article/view/448
Section
Articles
Author Biography

Shaymaa Mousa, King Abdulaziz University, Saudi Arabia

Business and Administration Faculty

References

[1]Ajbaili,M. Saudi & UAE at high risk to cyber-crime: report, al-arabiya news,dubai,(2009).Available:http://www.alarabiya.net/articles/2009/11/15/91411.html
[2] Baumann,R.Ethical hacking,(2002), Accessed:February15,2012.Available:http://www.giac.org/registration/gsec
[3] Graves, K. CEH® Certified Ethical Hacker StudyGuide,Indianapolis: sybox& wily, (2010).
[4] Jain, B, Ravi,K.Hacking- Ethical or Criminal-A Legal Quandary,The Icfai University Press, (2008).
[5] JAMIL,D andALI KHAN,M.Is Ethical Hacking Ethical,International Journal of Engineering Science and Technology(IJEST), Vol .3 No.5. (2011),pp. 3758-3763.
[6] Kraus,R.ISSA member,Ethical hacking from start to success, ISSA Journal,San antonio,USA, (2009),pp.14-18.
[7] Krejcie,R and Morgan,D. Determining Sample Size For Research Activities, In Educational And Psychological Measurement. University of Minnesota,Texas A. & M. University, (1970) , pp.607-610.
[8]Pondent, C. eHow Contributor The Advantages of Ethical Hacking Accessed:May7,2012. Available:http://www.ehow.com/info_8431442_advantages ethical-hacking.html
[9] Reuters. Saudi Arabia says hackers sabotagegovernment websites,Al-arabiya news,Riyadh,KSA,(2013)Available:http://english.alarabiya.net/en/media/2013/05/18/Saudi-Arabia-says-hackers-sabotage-government-websites.html
[10] Voutsa, A.E , Siakas,V. E , Nisioti ,S. K , and Ross, M, Survey of Informatics Students’ Awareness on Ethical Issues, The British Computer Society , (ISBN 1-902505-77-8). ( 2006), pp. 139-150.