Submitted:
29 August 2024
Posted:
30 August 2024
You are already at the latest version
Abstract
Keywords:
Introduction
Background
2. KSA Strategy to Combat Cyber Crimes
- 1-
- The Anti-Cyber Crime Law aims at preventing cybercrimes by identifying such crimes and defining their punishments. The objective is to ensure information security, protection of public interest, and morals, protection of rights of the legitimate use of computers and information networks, and protection of the national economy.
- 2-
- The National Cybersecurity Authority (NCA) was founded in 2017 under a Royal Order of, King Salman bin Abdulaziz Al Saud. Its purpose is to serve as the primary governing body for cybersecurity in the Kingdom and to act as the central point of contact for all related matters. The primary objective of the NCA is to enhance cybersecurity measures in order to protect the State's crucial interests, national security, essential infrastructures, priority sectors, and government services and operations. Despite the powers and obligations granted to the NCA under its legislation, both public and private companies, as well as any other body, are nonetheless obligated to uphold their cybersecurity responsibilities.
- 3-
- The National Cybersecurity Strategy was developed to reflect the strategic ambition of the Kingdom in a manner that is balanced between security, trust, and growth. It was created to achieve the concept of (a safe and reliable Saudi cyberspace that enables growth and prosperity) It also includes six main concepts: Integration, Regulation, Assurance, Defense, Cooperation, and Construction. Figure 2 shows the National Cybersecurity Strategy.
- 4-
- The indicative Center for Cybersecurity: To raise awareness of Cybersecurity avoid cyber risks and reduce their effects, the National Cyber Security Guidance Center has been launched to work on issuing alerts about the latest and most serious gaps, and it also works on launching awareness campaigns and programs and cooperates with other guidance centers.
- 5-
- Saudi Federation for Cyber Security: For the sake of local professional capabilities in Cybersecurity, software development, and drones, the Saudi Federation for Cybersecurity was launched under the Saudi Olympic Committee's umbrella. To provide activities and programs that contribute to increasing community awareness of Cybersecurity, programming, drones, and support and encourage young people to become professionals in this field [9].

3. Top 5 Cyber Threats in KSA
- There always should be a backup for important and sensitive information.
- The computers should be protected by strong firewalls and passwords, so no remote entity can access the devices.
- Improve their network to notice suspicious movements, which will limit the spread of ransomware.
- Intellectual property is vulnerable to theft (e.g., trade secrets or patents)
- Confidential information is vulnerable to hacking (e.g., employee and user private data)
- Causing damage in critical organizational infrastructures (e.g., database deletion)
- Home page takeovers completely(e.g., filling the page with ads)
- Protect the data from unauthorized access by encrypting the data with a strong algorithm in transit and at rest.
- There should be specialized cybersecurity teams who are trained for fast response whenever a threat happens.
Cyber-Attack Impact
5. Cyber Espionage and Ransomware Attacks in KSA
6. Conclusion:
References
- F. Momeni, “The impact of social, cultural, and individual factors on cybercrime,” Educ. Adm. Theory Pract., vol. 30, no. 5, pp. 10152–10159, May 2024. [CrossRef]
- “View of A review of cyber crime.” https://dzarc.com/social/article/view/244/230 (accessed Jul. 25, 2024).
- S. Muzafar and N. Z. Jhanjhi, “Success Stories of ICT Implementation in Saudi Arabia,” https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-1851-9.ch008, pp. 151–163, Jan. 1AD. [CrossRef]
- “Exploratory Study to Measure Awareness of Cybercrime in Saudi Arabia | Request PDF.” https://www.researchgate.net/publication/359330097_Exploratory_Study_to_Measure_Awareness_of_Cybercrime_in_Saudi_Arabia (accessed Jul. 25, 2024).
- S. K. Ratangiri, “Research Paper on Cyber,” no. June, 2021.
- “Unified National Platform GOV.SA.” https://www.my.gov.sa/wps/portal/snp/content/cybersecurity/!ut/p/z0/04_Sj9CPykssy0xPLMnMz0vMAfIjo8zijQx93d0NDYz8DczCLA0CQ4KCg1zMfL2CQ8z1g1Pz9AuyHRUBbL0PTQ!!/ (accessed Jul. 24, 2024).
- “National Cybersecurity Authority.” https://nca.gov.sa/en/ (accessed Jul. 27, 2024).
- “The National Cybersecurity Strategy.” https://nca.gov.sa/en/national-cybersecurity-strategy/ (accessed Jul. 27, 2024).
- “الاتحاد السعودي للامن السيبراني والبرمجة والدرونز.” https://safcsp.org.sa/en/about-us (accessed Jul. 27, 2024).
- R. A. Al-Mulhim, A. Al-Zamil, F. M. Al-Dossary, and S. Arabia, “Cyber-attacks on Saudi Arabia Environment,” Int. J. Comput. Networks Commun. Secur., vol. 8, no. 3, pp. 26–31, 2020, Accessed: Jul. 25, 2024. [Online]. Available: www.ijcncs.org.
- “Saudi Arabia (Ksa) Threat Landscape Report,” 2023, [Online]. Available: www.socradar.io.
- “Stolen Saudi Aramco Data Offered on the Dark Web.” https://jpt.spe.org/stolen-saudi-aramco-data-offered-on-the-darkweb (accessed Jul. 26, 2024).
- “Digital Trust Insights 2024 - The KSA perspective.” https://www.pwc.com/m1/en/publications/middle-east-digital-trust-insights-2024/the-ksa-perspective.html (accessed Jul. 26, 2024).
- R. Al Nafea and M. Amin Almaiah, “Cyber Security Threats in Cloud: Literature Review,” 2021 Int. Conf. Inf. Technol. ICIT 2021 - Proc., pp. 779–786, Jul. 2021. [CrossRef]
- J. S. A. Koshy, S. W. Ping, C. Y. Hui, T. Q. Hui, and S. Muzafar, “From On-Premises to Cloud: Crafting Your Pathway for Migration Success,” Nov. 2023. [CrossRef]
- О. С. Саприкін, “Moделі і метoди діагнoстування Zero-Day загрoз в кіберпрoстoрі,” Вісник сучасних інфoрмаційних технoлoгій, vol. 4, no. 2, pp. 155–167, Mar. 2021. [CrossRef]
- F. Alharbi et al., “The Impact of Cybersecurity Practices on Cyberattack Damage: The Perspective of Small Enterprises in Saudi Arabia,” Sensors 2021, Vol. 21, Page 6901, vol. 21, no. 20, p. 6901, Oct. 2021. [CrossRef]
- S. Muzafar, M. Humayun, and S. J. Hussain, “Emerging Cybersecurity Threats in the Eye of E-Governance in the Current Era,” https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-9624-1.ch003, pp. 43–60, Jan. 1AD. [CrossRef]
- M. AlBar and M. R. Hoque, “Factors affecting the adoption of information and communication technology in small and medium enterprises: a perspective from rural Saudi Arabia,” Inf. Technol. Dev., vol. 25, no. 4, pp. 715–738, Oct. 2019. [CrossRef]
- “The Top 5 Biggest Cybersecurity Threats That Small Businesses Face And How To Stop Them | Expert Insights.” https://expertinsights.com/insights/the-top-5-biggest-cyber-security-threats-that-small-businesses-face-and-how-to-stop-them/ (accessed Jul. 30, 2024).
- “Exclusive: Hackers Hit Virgin Mobile in Saudi Arabia.” https://www.bankinfosecurity.com/hackers-hit-virgin-mobile-in-saudi-arabia-a-15018 (accessed Jul. 27, 2024).
- “Healthcare entities in Saudi Arabia, Illinois, and Mississippi fall prey to Xing Team – DataBreaches.Net.” https://databreaches.net/2021/06/11/healthcare-entities-in-saudi-arabia-illinois-and-mississippi-fall-prey-to-xing-team/ (accessed Jul. 27, 2024).
- Almusaylim, Z. A., Zaman, N., & Jung, L. T. (2018, August). Proposing a data privacy aware protocol for roadside accident video reporting service using 5G in Vehicular Cloud Networks Environment. In 2018 4th International conference on computer and information sciences (ICCOINS) (pp. 1-5). IEEE.
- Kok, S. H., Abdullah, A., Jhanjhi, N. Z., & Supramaniam, M. (2019). A review of intrusion detection system using machine learning approach. International Journal of Engineering Research and Technology, 12(1), 8-15.
- Ray, S. K., Pawlikowski, K., & Sirisena, H. (2009). A fast MAC-layer handover for an IEEE 802.16 e-based WMAN. In AccessNets: Third International Conference on Access Networks, AccessNets 2008, Las Vegas, NV, USA, October 15-17, 2008. Revised Papers 3 (pp. 102-117). Springer Berlin Heidelberg.
- Gouda, W., Almurafeh, M., Humayun, M., & Jhanjhi, N. Z. (2022, February). Detection of COVID-19 based on chest X-rays using deep learning. In Healthcare (Vol. 10, No. 2, p. 343). MDPI.
- Humayun, M., Sujatha, R., Almuayqil, S. N., & Jhanjhi, N. Z. (2022, June). A transfer learning approach with a convolutional neural network for the classification of lung carcinoma. In Healthcare (Vol. 10, No. 6, p. 1058). MDPI.
- Fatima-tuz-Zahra, N., Jhanjhi, S. N. Brohi, N. A. Malik and M. Humayun, "Proposing a Hybrid RPL Protocol for Rank and Wormhole Attack Mitigation using Machine Learning," 2020 2nd International Conference on Computer and Information Sciences (ICCIS), Sakaka, Saudi Arabia, 2020, pp. 1-6. [CrossRef]
- Lim, M., Abdullah, A., Jhanjhi, N. Z., Khan, M. K., & Supramaniam, M. (2019). Link prediction in time-evolving criminal network with deep reinforcement learning technique. IEEE Access, 7, 184797-184807.
- Ramanjot, Mittal, U., Wadhawan, A., Singla, J., Jhanjhi, N. Z., Ghoniem, R. M.,... & Abdelmaboud, A. (2023). Plant disease detection and classification: A systematic literature review. Sensors, 23(10), 4769.
- Khairandish, M. O., Sharma, M., Jain, V., Chatterjee, J. M., & Jhanjhi, N. Z. (2022). A hybrid CNN-SVM threshold segmentation approach for tumor detection and classification of MRI brain images. IRBM, 43 (4), 290–299.
- Dash, S., & Verma, S. (2022). Kavita; Jhanjhi, NZ; Masud, M. Baz, M. Curvelet Transform Based on Edge Preserving Filter for Retinal Blood Vessel Segmentation. Comput. Mater. Contin, 71, 2459-2476.
- Khan, A., Jhanjhi, N. Z., Hamid, D. H., & Omar, H. A. (2024). Internet of Things (IoT) Impact on Inventory Management: A Review. In N. Jhanjhi & I. Shah (Eds.), Cybersecurity Measures for Logistics Industry Framework (pp. 224-247). IGI Global. [CrossRef]
- Midha, S., Verma, S., Mittal, M., Jhanjhi, N. Z., Masud, M., & AlZain, M. A. (2023). A Secure Multi-factor Authentication Protocol for Healthcare Services Using Cloud-based SDN. Computers, Materials & Continua, 74(2).
- Sindiramutty, S. R., Jhanjhi, N. Z., Tan, C. E., Khan, N. A., Shah, B., & Gaur, L. (2024). Securing the digital supply chain cyber threats and vulnerabilities. In Cybersecurity Measures for Logistics Industry Framework (pp. 156-223). IGI Global.


| Threat | Description |
|---|---|
| Phishing and Social Engineering | Phishing involves attackers impersonating trusted sources to trick users into revealing sensitive information or downloading malicious software. It's the most prevalent cyber threat globally, leading to data breaches and financial losses. Measures to combat it include multi-factor authentication (MFA), phishing-resistant authentication tools, and security awareness training. |
| Ransomware and Malware | Ransomware encrypts company data, demanding payment to decrypt it, causing significant financial damage. It's increasingly sophisticated, with attackers now employing double extortion tactics. Prevention strategies include zero trust architecture, endpoint protection, data backup, and recovery solutions. |
| Weak Passwords | Weak passwords weaken cybersecurity defenses, making it easier for attackers to compromise accounts. Practices such as password managers, strong password policies, and multi-factor authentication (MFA) mitigate this risk. Emerging solutions like FIDO2 Passkeys aim to replace passwords entirely for enhanced security. |
| Poor Patch Management | Outdated software and systems are vulnerable to cyber-attacks exploiting known vulnerabilities. Effective patch management tools and strategies ensure timely updates across all devices and networks, reducing exposure to threats like malware and ransomware. |
| Insider Threats | Insider threats arise from employees or associates with access to critical data, posing risks through malicious actions or inadvertent mistakes. Mitigating insider threats involves implementing strict access controls, monitoring systems, and ongoing employee training on data security practices. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).