Preprint Article Version 1 This version is not peer-reviewed

Top 5 Deadly Cybersecurity Threats to Kingdom of Saudi Arabia

Version 1 : Received: 29 August 2024 / Approved: 30 August 2024 / Online: 30 August 2024 (15:46:50 CEST)

How to cite: Alkhalifa, M.; Aljaafari, M.; Muzafar, S. Top 5 Deadly Cybersecurity Threats to Kingdom of Saudi Arabia. Preprints 2024, 2024082244. https://doi.org/10.20944/preprints202408.2244.v1 Alkhalifa, M.; Aljaafari, M.; Muzafar, S. Top 5 Deadly Cybersecurity Threats to Kingdom of Saudi Arabia. Preprints 2024, 2024082244. https://doi.org/10.20944/preprints202408.2244.v1

Abstract

The current era in which we live is centered on information technology because we live in the renaissance of information and its expansion on multiple scales and fields. People who have a high knowledge of technology and a passion for it seek to disseminate this information and process it correctly, and computers have now become one of the most essential devices for government operations. Large companies have already begun to use it in most businesses, and it has helped direct some government procedures for joint e-government, which allows people to access government services from home from their computers. It is also not hidden that with the increase in computer use, electronic crimes increased, and this contributed to the formation of laws. In various countries to deal with them. As technology evolves, the sophistication and impact of these cyber threats continue to grow, posing significant challenges to cybersecurity. This research discusses the role against cybercrime, the regulations, and the allowable behavior of using technology in Saudi Arabia. It analyzes cybercrime in the Kingdom and the system for combating cybercrime.

Keywords

Cyber Crime; Anti-Cybercrime Law; KSA; Ransomware; Dark Web

Subject

Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.