IIUM Repository

Cyber-attacks detection & protection in Kuwait government sectors

Alshaikhli, Imad Fakhri Taha and Al-Enezi , Khalid Abdulkareem and Al-kandari, Abdulrahman and Mahmood Al Dabbagh, Sufyan Salim (2014) Cyber-attacks detection & protection in Kuwait government sectors. In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014, 29-30 Dec 2014, Amman- Jordan.

[img] PDF - Published Version
Restricted to Registered users only

Download (218kB) | Request a copy


The world nowadays has witnessed a lot of crimes of cyber-attacks where many people suffered from many hackers who tried to steal important information or damage the programs found in the computers of victims. There has become necessity for companies to have different systems for protection. Many companies have been specialized in having systems for protection of these risks of hackers. Process of protection from cyber-attacks can be identified based on three main steps; reactive services, proactive services and security quality management. Such issues will be discussed in this research to help companies identify different risks against their computer systems to put an end to such attacks.

Item Type: Conference or Workshop Item (UNSPECIFIED)
Additional Information: 6534/42858 ISBN: 978-1-4799-1845-4 pp 50-55
Uncontrolled Keywords: Cyber Attacks; CSIRT; Artifact response; Artifact removal techniques; Artifact Response Coordination.
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology
Kulliyyah of Information and Communication Technology
Depositing User: Professor Imad Taha
Date Deposited: 15 May 2015 16:02
Last Modified: 20 Jun 2018 09:35
URI: http://irep.iium.edu.my/id/eprint/42858

Actions (login required)

View Item View Item


Downloads per month over past year