全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Ontology-Based Cyber Security Policy Implementation in Saudi Arabia

DOI: 10.4236/jis.2018.94021, PP. 315-333

Keywords: Cyber Security, Cyber Security Policy, Implementation, Ontology, Saudi Arabia

Full-Text   Cite this paper   Add to My Lib

Abstract:

Cyber security is an important element of national security and the safekeeping of a nation’s constituency and assets. In Saudi Arabia, the point of interest on cyber security is particularly outstanding due to the fact that Saudi Arabia has a highly cyber attacks all over the Arab countries. This paper displays on contemporary studies done in Saudi Arabia in regards to cyber security policy coverage. The point of interest of this paper is the use of ontology to identify and suggest a formal, encoded description of the cyber security strategic environment, and propose the development of ontology to be able to permit the implementation of the sort of policy. The intention of the ontology is to become aware of and constitute the multi-layered company of gamers and their related roles and obligations within the cyber security environment. This could make contributions in large part to the improvement, implementation and rollout of a country wide cyber security policy in Saudi Arabia.

References

[1]  Ghernouti-Helie, S. (2010) A National Strategy for an Effective Cybersecurity Approach and Culture. 2010 International Conference on Availability, Reliability and Security, Krakow, 15-18 February 2010, 370-373. https://doi.org/10.1109/ARES.2010.119
[2]  Almarhabi, K. (2016) Adherence to ICT Security and Privacy Policies in Saudi Arabia. International Journal of Computer Applications, 147, 13-18.
https://doi.org/10.5120/ijca2016910974
[3]  Appenzeller, T. (2004) The End of Cheap Oil. National Geographic, 205, 80-109.
[4]  Alassafi, M.O., Alharthi, A., Walters, R.J. and Wills, G.B. (2017) A Framework for Critical Security Factors That Influence the Decision of Cloud Adoption by Saudi Government Agencies. Telematics and Informatics, 34, 996-1010. https://doi.org/10.1016/j.tele.2017.04.010
[5]  Bawazir, S.A. (2006) The Key Factors of Successful Sustainable Development: E-Government in Saudi Arabia as an Example. Proceedings of the Saudi 6th National Computer Conference, 13-18. http://unpan1.un.org/intradoc/groups/public/documents/unpan/unpan033484.pdf
[6]  Geller, J., Ae Chun, S. and Wali, A. (2014) A Hybrid Approach to Developing a Cyber Security Ontology. Proceedings of 3rd International Conference on Data Management Technologies and Applications, 1, 377-384. https://doi.org/10.5220/0005111503770384
[7]  Ahmed, S., Buragga, K. and Ramani, A.K. (2011) Security Issues Concern for E-Learning by Saudi universities. 2011 13th International Conference on Advanced Communication Technology, Gangwon-Do, 13-16 February 2011, 1579-1582.
[8]  Elmogazy, H. and Bamasak, O. (2013) Towards Healthcare Data Security in Cloud Computing. 2013 8th International Conference for Internet Technology and Secured Transactions, London, 9-12 December 2013, 363-368.
[9]  Othman, S.B., Trad, A., Youssef, H. and Alzaid, H. (2013) Secure Data Aggregation in Wireless Sensor Networks. 12th Annual Mediterranean Ad Hoc Networking Workshop, Ajaccio, 24-26 June 2013, 55-58. https://doi.org/10.1109/MedHocNet.2013.6767410
[10]  Rahman, S.M.M. (2014) Towards Integrity Protection of Software for E-Health Data. 2014 IEEE International Conference on Multimedia and Expo Workshops, Chengdu, 14-18 July 2014, 1-5.
[11]  Baig, O., Ai-Harthi, Y.S. and Al-Tubaishi, E. (2014) Game-Theoretic Algorithm Stimulating Cooperation in Multi-Hop Wireless Networks. 5th International Conference on Game Theory for Networks (GAMENETS), Beijing, 25-27 November 2014, 1-5.
https://doi.org/10.1109/GAMENETS.2014.7043691
[12]  Zeb, K., Baig, O. and Asif, M.K. (2015) DDoS Attacks and Countermeasures in Cyberspace. 2nd World Symposium on Web Applications and Networking, Hammamet, 21-23 March 2015, 1-6.
[13]  Faisal, M. and Mathkoor, H. (2015) SDTP: Secure Data Transmission Protocol in Ad Hoc Networks Based on Link-Disjoint Multipath Routing. 2nd World Symposium on Web Applications and Networking, Hammamet, 21-23 March 2015, 1-5.
https://doi.org/10.1109/WSWAN.2015.7210348
[14]  Kurniawan, F., Khalil, M.S., Khan, M.K. and Alginahi, Y.M. (2013) Exploiting Digital Watermarking to Preserve Integrity of the Digital Holy Quran Images. Taibah University International Conference on Advances in Information Technology for the Holy Quran and Its Sciences, Al-Madinah, 22-25 December 2013, 30-36.
[15]  Alsmadi, I.M. (2013) Techniques to Preserve the Integrity of the Electronic Versions of the Nobel Quran. Taibah University International Conference on Advances in Information Technology for the Holy Quran and Its Sciences, Al-Madinah, 22-25 December 2013, 52-56.
[16]  Munir, K. (2015) Security Model for Cloud Database as a Service (DBaaS). International Conference on Cloud Technologies and Applications, 1-5.
https://doi.org/10.1109/CloudTech.2015.7336974
[17]  Abuhaija, B., Awadelkarim, A.M., Shilbayeh, N. and Alwakeel, M. (2014) A Model for Securing Islamic Websites: Formal Specification Paradigm: IT Research Center for the Holy Quran and Its Sciences (NOOR). 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology, Madinah, 80-85.
[18]  Ahmad, A., Nasser, N. and Anan, M. (2016) An Identification and Prevention of Theft-of-Service Attack on Cloud Computing. International Conference on Selected Topics in Mobile & Wireless Networking, Cairo, 11-13 April 2016, 1-6.
https://doi.org/10.1109/MoWNet.2016.7496632
[19]  Alghamdi, A., Alshamrani, M., Alqahtani, A., Al Ghamdi, S.S.A. and Harrathi, R. (2016) Secure Data Aggregation Scheme in Wireless Sensor Networks for IoT. International Symposium on Networks, Computers and Communications, Hammamet, 11-13 May 2016, 1-5.
https://doi.org/10.1109/ISNCC.2016.7746071
[20]  Alkanhel, R. and Ambroze, M.A. (2016) Extended Grouping of RFID Tags Based on Progressive Edge-Growth Methods. 5th International Conference on Electronic Devices, Systems and Applications, Ras Al Khaimah, 6-8 December 2016, 1-5.
https://doi.org/10.1109/ICEDSA.2016.7818544
[21]  Kuppuswamy, P., Banu, R. and Rekha, N. (2017) Preventing and Securing Data from Cyber Crime Using New Authentication Method Based on Block Cipher Scheme. 2nd International Conference on Anti-Cyber Crimes, Abha, 26-27 March 2017, 113-117.
https://doi.org/10.1109/Anti-Cybercrime.2017.7905274
[22]  Dhaou, I.B., Gia, T.N., Liljeberg, P. and Tenhunen, H. (2017) Low-Latency Hardware Architecture for Cipher-Based Message Authentication Code. IEEE International Symposium on Circuits and Systems, Baltimore, 28-31 May 2017, 1-4.
[23]  Zheng, Q., Wang, X., Khan, M.K., Zhang, W., Gupta, B.B. and Guo, W. (2018) A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service. IEEE Access, 6, 711-722. https://doi.org/10.1109/ACCESS.2017.2775038
[24]  Elleuchi, M., Boujeleben, M., Abid, M. and BenSaleh, M.S. (2017) Securing RPL-Based Internet of Things Applied for Water Pipeline Monitoring. 25th International Conference on Software, Telecommunications and Computer Networks, Split, 21-23 September 2017, 1-7.
https://doi.org/10.23919/SOFTCOM.2017.8115580
[25]  Shuaibu, M.B. and Ibrahim, R.A. (2017) Web Application Development Model with Security Concern in the Entire Life-Cycle. 4th IEEE International Conference on Engineering Technologies and Applied Sciences, Salmabad, 29 November-1 December 2017, 1-6.
https://doi.org/10.1109/ICETAS.2017.8277849
[26]  Kurdi, R., Hersi, F., Bahagari, S., Kaosar, M., Qaisar, S.M. and Subasi, A. (2017) A Mobile Fingerprint Authentication in Saudi Arabian Call Centers. International Conference on Electrical and Computing Technologies and Applications, Ras Al Khaimah, 21-23 November 2017, 1-4.
https://doi.org/10.1109/ICECTA.2017.8252000
[27]  Communications and Information Technology Commission (2011) Information Security Policies and Procedures Development Framework for Government Agencies. KSA Communications and Information Technology Commission.
http://www.citc.gov.sa/en/RulesandSystems/RegulatoryDocuments/OtherRegulatoryDocuments/
Documents/CITC_Information_Security_Policies_and_Procedures_Guide_En.pdf
[28]  Thakur, K., Ali, M.L., Gai, K. and Qiu, M. (2016) Information Security Policy for E-Commerce in Saudi Arabia. 2nd IEEE International Conference on Big Data Security on Cloud, New York, 9-10 April 2016, 187-190. https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.14
[29]  Razek, N.A. (2014) Academic Integrity: A Saudi Student Perspective. Academy of Educational Leadership Journal, 18, 143. https://ecommons.udayton.edu/edc_fac_pub/3/
[30]  Sheikh, A.A. (2017) Cyber Security Framework for Saudi Arabian Monetary Authority. 1-56.
http://www.sama.gov.sa/en-US/Laws/BankingRules/SAMA%20Cyber%20Security%20
Framework.pdf
[31]  Madini, O.A., Alharthi, A., Walters, R.J. and Wills, G.B. (2016) Security Risk Factors That Influence Cloud Computing Adoption in Saudi Arabia Government Agencies. International Conference on Information Society, Dublin, 10-13 October 2016, Vol. 1, 1-4.
[32]  Aldossary, A.A. and Zeki, A.M. (2013) The Influence of Students’ Knowledge on Security towards Their Behavior with Security Risks within the Context of Saudi Arabia. International Conference on Advanced Computer Science Applications and Technologies, Kuching, 23-24 December 2013, 1-4. https://doi.org/10.1109/ACSAT.2013.9
[33]  Gruber, T.R. (1993) A Translation Approach to Portable Ontology Specifications. Knowledge Acquisition, 5, 199-220. https://doi.org/10.1006/knac.1993.1008
[34]  McGuinness, D.L. and Van Harmelen, F. (2004) OWL Web Ontology Language Overview. W3C Recommendation, 10, 2004. http://www.w3.org/TR/2004/REC-owl-features-20040210/

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133