Browse By:

UTILIZATION OF SECURITY TECHNIQUES FOR CYBER WARFARE: KSA

Al-Harthi, Ohoud S. and Faragallah, Osama S. and Al-Amri, Jehad F. (2021) UTILIZATION OF SECURITY TECHNIQUES FOR CYBER WARFARE: KSA. European Journal of Computer Science and Information Technology, 9 (4). pp. 54-72. ISSN 2054-0957 (Print), 2054-0965 (Online)

[thumbnail of Utilization of Security Techniques.pdf] Text
Utilization of Security Techniques.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial No Derivatives.

Download (714kB)

Abstract

Cyber warfare is considered mysterious targets of unknown sources that move through information and communication networks worldwide and use electronic weapons targeting information technology. They are directed against vital installations or invaded by agents of the intelligence services. Cybersecurity is one of the most significant digital technological breakthroughs that the world is now witnessing. It is considered the first weapon specialized in defending computers, electronic systems, and data from malicious attacks, servers, mobile devices, and networks. As a result, the goal of this research is to determine how Saudi Arabia uses security approaches for cyber warfare. The study adopted the descriptive method which addressed several aspects related to the strategies and security techniques for cyber warfare. The results indicate that the focus on cyber that pays importance to the possible countermeasures and preventive techniques that could be used to counter the risks of attackers, and discusses the encryption and watermark measures organizations can protect data against the illegal leak and hacking.

Item Type: Article
Uncontrolled Keywords: cyber warfare, cybersecurity, encryption, watermark
Subjects: T Technology > T Technology (General)
Depositing User: Professor Mark T. Owen
Date Deposited: 28 Mar 2022 13:25
Last Modified: 28 Mar 2022 13:25
URI: https://tudr.org/id/eprint/148

Actions (login required)

View Item
View Item
UNSPECIFIED UNSPECIFIED