Minimum capabilities and requirements for establishing a national CERT for ACG /

Securing data and networks in information technology (IT) is a very important defense issue against breaching or hacking by cyber-attacks to have IT business continuity. Because of using technology in GEs, all IT infrastructures are under risk. It is a demand task to design protection methods, which...

全面介绍

Saved in:
书目详细资料
主要作者: Alenezi, Khaled
格式: Thesis
语言:English
出版: Gombak, Selangor : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2016
主题:
在线阅读:Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library.
标签: 添加标签
没有标签, 成为第一个标记此记录!
实物特征
总结:Securing data and networks in information technology (IT) is a very important defense issue against breaching or hacking by cyber-attacks to have IT business continuity. Because of using technology in GEs, all IT infrastructures are under risk. It is a demand task to design protection methods, which defend and reduce the affect off cyber-attacks. A minimum set of capabilities and requirements for establishing a national Computer Emergency Response Team (CERT) for protecting Government Entities (GEs) from cyber-attacks was proposed. The case study is the Arabian Gulf Countries (AGC). First, this research will identify the cyber-attack threats faced by the GEs and the effect of these threats on mission-critical assets and services. Besides, the obstacles related to cyber-attack threats facing AGC services and assets will be explained. Furthermore, this research will propose a minimum set of capabilities for a CERT team setup involving GEs to sustain and protect mission-critical assets. However, this thesis will also explain the CERT team obstacles related to avoiding cyber-attack threats targeting the region. In addition, this research will determine minimum requirements for CERT technologies to provide high-performance protection against cyber-attack threats to mission-critical assets and services. Moreover, this research will determine obstacles to using technology to avoid cyber-attack, and the obstacles that occur during using technology to avoid cyber-attack. Finally, this thesis will suggest conclusions for future work, including discussion of results.
实物描述:xvi, 200 leaves : ill. ; 30cm.
参考书目:Includes bibliographical references (leaves 192-197).