Description
Write a four- to five-page critical essay dealing with the following questions.
- What are the security and privacy risks and vulnerabilities in using the Internet in Saudi Arabia specific to your organization?
- List some specific common attack strategies and describe how they work and describe their effects/consequences on the security and privacy of both individual users and your organization in Saudi Arabia. Cite some specific examples and show how the damage can be mitigated or avoided (if possible).
Your paper should meet the following structural requirements:
- The paper should be 4-5 pages in length, not including the cover sheet and reference page.
- Format according to APA
- Provide support for your statements with in-text citations from a minimum of three scholarly resources. Two of these sources may be from the class readings, textbooks, or lectures, but one must be external. The Saudi Digital Library is a good place to find these references
- The references must be new 1 to 4 years.
Explanation & Answer
please find the attached file below and ask me for any clarifications or editing. Otherwise, invite me for more questions.
1
Running Head: ISA IN SAUDI ARABIA
Information security vulnerabilities in Saudi Arabia
Name
Institution of Affiliation
Professor
Date
ISA IN SAUDI ARABIA
2
Introduction
Internet security vulnerabilities in Saudi Arabia have been reported to be common with
more than 3000 hackers from over 50 countries trying to infiltrate organizations as well as
individual users on the internet ("Information Security Issues and Threats in Saudi Arabia: A
Research Survey," 2016). Being amongst one of the most influential kingdoms in the Middle
East, the country has abundant sources of oil, and this draws the attention of external and internal
ill-motive individual and groups trying to leverage vulnerabilities to gain a monetary advantage.
It is imperative to mention that espionage techniques by adversary countries often exploit
internet vulnerabilities in the country to obtain sensitive military and political information
(AlGarni, 2015). Largely, research points out that the level of Information Security Awareness
(ISA) is significantly low in the country and this is greatly contributed by the availability of
internet-enabled communicating devices in the hands of users who are not trained and aware of
information security (AlGarni, 2015). The text presented herein, discusses the vulnerabilities,
their risks, consequences, and ways to mitigate the risks in respect to an online marketing
organization.
Internet vulnerabilities and security risks
In the computing context, a vulnerability is a flaw or a type of weakness in an
information system that can be exploited in an attack and is open to computer security threats
(Al-Sharif & Almadi, 2014). Threats, on the other hand, are a set of procedures used to gain
illegal access and control in an information system often causing damage (Al-Sharif & Almadi,
2014). The risks associated with the vulnerabilities a...