Minimum capabilities and requirements for establishing a national CERT for ACG /
Securing data and networks in information technology (IT) is a very important defense issue against breaching or hacking by cyber-attacks to have IT business continuity. Because of using technology in GEs, all IT infrastructures are under risk. It is a demand task to design protection methods, which...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
Gombak, Selangor :
Kulliyyah of Information and Communication Technology, International Islamic University Malaysia,
2016
|
Subjects: | |
Online Access: | Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 030930000a22002770004500 | ||
---|---|---|---|
008 | 160610t2016 my a g m 000 0 eng d | ||
040 | |a UIAM |b eng | ||
041 | |a eng | ||
043 | |a a-my--- | ||
050 | 0 | 0 | |a HV551.2 |
100 | 1 | |a Alenezi, Khaled | |
245 | 1 | |a Minimum capabilities and requirements for establishing a national CERT for ACG / |c by Khaled Alenezi | |
260 | |a Gombak, Selangor : |b Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, |c 2016 | ||
300 | |a xvi, 200 leaves : |b ill. ; |c 30cm. | ||
502 | |a Thesis (Ph.D)--International Islamic University Malaysia, 2016. | ||
504 | |a Includes bibliographical references (leaves 192-197). | ||
520 | |a Securing data and networks in information technology (IT) is a very important defense issue against breaching or hacking by cyber-attacks to have IT business continuity. Because of using technology in GEs, all IT infrastructures are under risk. It is a demand task to design protection methods, which defend and reduce the affect off cyber-attacks. A minimum set of capabilities and requirements for establishing a national Computer Emergency Response Team (CERT) for protecting Government Entities (GEs) from cyber-attacks was proposed. The case study is the Arabian Gulf Countries (AGC). First, this research will identify the cyber-attack threats faced by the GEs and the effect of these threats on mission-critical assets and services. Besides, the obstacles related to cyber-attack threats facing AGC services and assets will be explained. Furthermore, this research will propose a minimum set of capabilities for a CERT team setup involving GEs to sustain and protect mission-critical assets. However, this thesis will also explain the CERT team obstacles related to avoiding cyber-attack threats targeting the region. In addition, this research will determine minimum requirements for CERT technologies to provide high-performance protection against cyber-attack threats to mission-critical assets and services. Moreover, this research will determine obstacles to using technology to avoid cyber-attack, and the obstacles that occur during using technology to avoid cyber-attack. Finally, this thesis will suggest conclusions for future work, including discussion of results. | ||
596 | |a 1 | ||
655 | 7 | |a Theses, IIUM local | |
690 | |a Dissertations, Academic |x Kulliyyah of Information and Communication Technology |z IIUM | ||
710 | 2 | |a International Islamic University Malaysia. |b Kulliyyah of Information and Communication Technology | |
856 | 4 | |u http://studentrepo.iium.edu.my/handle/123456789/5474 |z Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. | |
900 | |a sbh-ls-naw | ||
999 | |c 436102 |d 468058 | ||
952 | |0 0 |6 T HV 000551.2 A368M 2016 |7 0 |8 THESES |9 761084 |a IIUM |b IIUM |c MULTIMEDIA |g 0.00 |o t HV 551.2 A368M 2016 |p 11100346671 |r 2017-10-19 |t 1 |v 0.00 |y THESIS | ||
952 | |0 0 |6 TS CDF HV 551.2 A368M 2016 |7 0 |8 THESES |9 854606 |a IIUM |b IIUM |c MULTIMEDIA |g 0.00 |o ts cdf HV 551.2 A368M 2016 |p 11100346672 |r 2017-10-27 |t 1 |v 0.00 |y THESISDIG |