Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
This paper provides a detailed technical roadmap for the implementation of robust security controls within Kuwaiti organizations. It focuses on aligning with the Central Bank of Kuwait's Cybersecurity Framework (CBK CSF), NIST, ISO 27001, CIS, PCI DSS 4.0.1, and SWIFT 2024. The paper outlines practical strategies for risk management, encryption, network security, access control, and incident response, with particular attention to compliance requirements and the unique needs of Kuwait's financial, governmental, and industrial sectors.
This paper offers a structured approach for implementing robust security measures within Operational Technology (OT) environments in Kuwait. Industrial environments—such as energy, utilities, and manufacturing—face unique cybersecurity challenges that differ from Information Technology (IT) systems. The focus here is on securing critical OT assets using global standards like IEC 62443 and NIST SP 800-82. The paper provides step-by-step guidance on how Kuwaiti organizations can achieve resilient, secure OT environments, ensuring safe operations amid growing cyber threats.
Open banking is rapidly transforming the financial landscape, offering new opportunities for innovation, customer-centric services, and enhanced financial inclusion. In Kuwait, open banking aligns with the country's Vision 2035 goals, presenting a pathway for digital transformation and economic diversification. However, the rise of open banking also brings a range of cybersecurity challenges that must be addressed to ensure data privacy, regulatory compliance, and the security of sensitive financial information. This paper explores the opportunities open banking presents in Kuwait and examines the cybersecurity challenges associated with its implementation. It also provides recommendations for mitigating risks and securing Kuwait’s open banking ecosystem.
Information Management & Computer Security, 2010
United Arab Emirates organizations are embarking onto the technology world where the exchange of information is increasingly taking place through electronic means and data is stored electronically, this paper attempts to investigate the need to develop a UAE data security strategy and a detailed framework that can ensure the safety of data and can also cope with all types of disasters expected in the country. The paper also reviews and analyses the types of hazards in the United Arab Emirates. In order to obtain a global view on how organizations in the United Arab Emirates are managing the security of their electronic information, a questionnaire has been designed and distributed with the aim of obtaining a clear understanding of their data security procedures, practices and policies The research has shown that each organization from the outset should have a set-plan, which has to be periodically analysed, reviewed, and modified to keep abreast of the technological advancements and risks in order to protect its electronic data.
2023
Exposure of valuable assets of Yemen banking sector to various attacks and threats may violate the privacy, confidentiality, integrity and accessibility (availability) of their data, information or computer systems resulting in financial and valuable loss. Such a violation may adversely affect the continuity of the business and the competitive advantages they seek to achieve. The objective of this paper is to evaluate the current security performance of banking systems in Yemen and to introduce a framework for improving information security management based on the ISO 27002-2013 benchmark and standards. The proposed framework includes important security factors which are people, technology and process. IBM SPSS AMOS is applied for testing framework hypothesis on complex variable relationships and gain new insight. Such framework shows that the process variable has obtained the most direct positive effect on improving information security management system with value (0.990), while the technology variable has obtained the second direct positive effect on improving the information security management system with value (0.930). Finally, the people variable has obtained the least direct positive effect on improving the information security management system with value (0.740). The research methodology includes: data collection, data analysis, reliability testing and computing results. The model validated and compared with other similar models available in the literature and the results were in valid range. Also, the research hypotheses were significant and deferent results of the proposed model were very promising.
Land Forces Academy Review, 2022
In this paper, the researcher briefly discusses the attacks that have occurred recently within Saudi Arabia to entities such as Saudi Aramco to the Ministry of Health. These attacks are aggressions against government institutions that can render a sector vulnerable. Observing the ongoing attacks on critical infrastructure in Ukraine one can see a replication of similar attacks that could occur and spread over the Middle East. As this nation is a politically turbulent region, there is no small number of external threats. To combat these evolving threats, a shift towards cyber readiness must occur. This includes new laws, security-hardened technologies, and education for people living in the kingdom.
International Journal of Information Technology, 2021
Security of data has always been a contested issue since the internet became the way of life. The internet and Web 2.0 followed by Web 3.0 have enabled many applications for the use of the citizens. E-government is one of them. Questions have always been raised about the security of data in E-government applications and services. Saudi Arabia is one of the developing countries when it comes to the internet-based services. This paper attempts to review the effectiveness of security policies when dealing with threats and vulnerabilities. We shall study these aspects in the context of Saudi Arabian E-government. E-government, anywhere in the world is a very sensitive area when it comes to ensuring security of the users as well as the corporate data. Breach in security of user data may have catastrophic implications in some cases.
Journal of Management Research, 2014
The study presents the results of the analysis of the goals of information security to ensure information security through a case study of the income tax department and sales in Jordan. The goal of the analysis is to identify the security situation in the department of information and the development of information system security software and knowledge of the impact of these standards on the security of computerized information systems in this department. The study sample consists of 360 questionnaires, of which 270 questionnaires subjected to statistical analysis, which accounted for 88%, the researcher has conducted a descriptive study to get to the analytical results and the achievement of the objectives of the study.
KnE Engineering, 2018
The article focuses on the legal framework regulating cybersecurity in the Kingdom of Bahrain, in comparison with the laws in force in the other Gulf Cooperation Council (GCC) Countries. It discusses, on one side, the existing rules applicable to the variety of possible cyber-attacks affecting the activity of the businesses that engage in electronic commerce and, on the other hand, the regulations for the intrinsic threats connected to the digitalisation of the banking system. The study starts with a brief overview of the evolution of cybersecurity, from purely Information Technology issue to an emerging area of law, and then analyses the legal grounds for enforcing specific rules in the field, especially in the Arabian Gulf Countries. It examines the status of the laws in Bahrain and GCC and highlights the necessity to implement a more comprehensive regulatory framework, along with the need for investments in cutting-edge technologies, to increase the degree of protection and, consequently, derail the cyber-threats.
Zenodo (CERN European Organization for Nuclear Research), 2022
This study aims to analyze the fundamental governance practices of Yemeni banks' information security management systems (ISMS). Therefore, an empirical investigation was performed to define the information security governance (ISG) maturity of banks and make recommendations that allow their administrations to improve security and reduce risks to their businesses. This study uses a mixed qualitative and quantitative approach, convenience sampling, and data collection from 26 experts and specialists in banking information security, in a total of 13 government and commercial banks through a survey. This study adopted Ngwum's maturity framework to develop the study's instrument. It provides empirical insights and identifies the strengths and weaknesses of Yemeni banks' information security management systems' ISG practices. The general level at which bank systems implement ISG requirements was found to be the average basic security maturity level. The results demonstrate that practices at the level of information security management, training, and awareness are the strengths of banks' ISMSs, whereas those of the role and responsibility factors constitute a significant weakness. This study meets the needs identified to assess ISG maturity, includes a detailed discussion on banks' and ISG indicators' strengths and weaknesses, and their implications, and provides the required recommendations. Moreover, these recommendations may help stakeholders in banks formulate more appropriate policies or provide a more effective focus on ISG controversies that are needed to improve the information security situation and reduce the estimated gap in their practices.
Principles of Decoration in the Roman World, 2021
Revista ArtyHum, 2024
Presses universitaires de Provence eBooks, 2022
Plattform, Zeitschrift des Vereins für Pfahlbau und Heimatkunde e.V., 30-31, 2020-2021 (2023) 48-61
Revista De Cercetare Si Interventie Sociala, 2015
Open Forum Infectious Diseases, 2021
Computational Intelligence and Neuroscience, 2022
International Journal of Hematology and Oncology, 2013
Review of Economic Dynamics, 2018
Gazi Üniversitesi Fen Bilimleri Dergisi Part C: Tasarım ve Teknoloji, 2023