Security Related Issues In Saudi Arabia Small Organizations: A Saudi Case Study

Dhoha A. Almubayedh, Mashael Al khalis, Ghadeer Alazman, M. Alabdali, Rouqaiah Al-Refai, Naya Nagy
{"title":"Security Related Issues In Saudi Arabia Small Organizations: A Saudi Case Study","authors":"Dhoha A. Almubayedh, Mashael Al khalis, Ghadeer Alazman, M. Alabdali, Rouqaiah Al-Refai, Naya Nagy","doi":"10.1109/NCG.2018.8593058","DOIUrl":null,"url":null,"abstract":"The paper emphasizes that the precise awareness of information security policy, its aspects and practices is a significant point that organizations must pay attention to prevent potential security threats. However, some Saudi organizations lack the security awareness. This paper represents some previous studies that were conducted to evaluate the state of policy and information security awareness and application in a Saudi organization. The paper considers a small Saudi organization to perform a case study, to audit its state and describe the possible risk scenarios that may take place. Most information about the company was gathered by interviewing its CEO. The audit found five possible risk scenarios, named lack of security policy, personal information leakage from the website, the risk of damage of the CEO’s device and two scenarios related to outsourcing companies. The paper provided some recommendations to the audited organization which may serve other organizations that have the same characteristics, which are adopting and documenting a comprehensive security policy and procedures from beginning stages of a company, ensure that the employees are aware of these documents and the required practices to secure sensitive information. In addition, introduce a mechanism to ensure that security controls are met and to secure personal information transmitted over their website and recommending to regularly checks that the website is bugs free. Additionally, recommends considering more security details on the outsourcing contracts and involve a specialized attorney on it. Also, prefer short-term out-sourcing contracts and take possible alternatives third-party companies into consideration as a precaution.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 21st Saudi Computer Society National Computer Conference (NCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCG.2018.8593058","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

Abstract

The paper emphasizes that the precise awareness of information security policy, its aspects and practices is a significant point that organizations must pay attention to prevent potential security threats. However, some Saudi organizations lack the security awareness. This paper represents some previous studies that were conducted to evaluate the state of policy and information security awareness and application in a Saudi organization. The paper considers a small Saudi organization to perform a case study, to audit its state and describe the possible risk scenarios that may take place. Most information about the company was gathered by interviewing its CEO. The audit found five possible risk scenarios, named lack of security policy, personal information leakage from the website, the risk of damage of the CEO’s device and two scenarios related to outsourcing companies. The paper provided some recommendations to the audited organization which may serve other organizations that have the same characteristics, which are adopting and documenting a comprehensive security policy and procedures from beginning stages of a company, ensure that the employees are aware of these documents and the required practices to secure sensitive information. In addition, introduce a mechanism to ensure that security controls are met and to secure personal information transmitted over their website and recommending to regularly checks that the website is bugs free. Additionally, recommends considering more security details on the outsourcing contracts and involve a specialized attorney on it. Also, prefer short-term out-sourcing contracts and take possible alternatives third-party companies into consideration as a precaution.
沙特阿拉伯小型组织的安全相关问题:沙特案例研究
本文强调,准确认识信息安全策略及其方面和实践是组织防范潜在安全威胁必须注意的重要一点。然而,一些沙特组织缺乏安全意识。本文代表了一些先前的研究,这些研究是为了评估沙特组织的政策和信息安全意识和应用状态而进行的。本文考虑一个小型沙特组织进行案例研究,审计其状态并描述可能发生的风险情景。该公司的大部分信息是通过采访首席执行官收集的。审计发现了五种可能的风险场景,分别是缺乏安全政策、个人信息从网站泄露、CEO设备损坏的风险,以及两种与外包公司相关的场景。本文为被审计组织提供了一些建议,这些建议可以为其他具有相同特征的组织提供服务,这些组织从公司的开始阶段就采用并记录了全面的安全政策和程序,确保员工了解这些文件和保护敏感信息所需的实践。此外,引入一种机制,以确保安全控制措施得到满足,并确保在其网站上传输的个人信息的安全,并建议定期检查网站是否没有漏洞。此外,建议在外包合同中考虑更多的安全细节,并聘请专门的律师。此外,更喜欢短期外包合同,并考虑可能的替代第三方公司作为预防措施。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信