Rawan Abdulaziz Al-Mulhim, Lama Alzamil, Fay Mohammed Al-Dossary
{"title":"对沙特阿拉伯环境的网络攻击","authors":"Rawan Abdulaziz Al-Mulhim, Lama Alzamil, Fay Mohammed Al-Dossary","doi":"10.47277/ijcncs/8(3)1","DOIUrl":null,"url":null,"abstract":"Even though cyber-attacks can’t be compared to a nuclear attack but they both pose a serious threat to national and international security. As we witness today cyberwarfare is increasing and Saudi Arabia has become a major target of Cyber-attacks as a result of its economic and digital revolution, high technology adoption and the growth of the gas and oil industry. This paper presents, a case study of the cyber-attacks on the Saudi environment. We focused on two specific malwares Shamoon and Mamba Ransomware. It also explores their methodologies and structure for future defense.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0000,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Cyber-attacks on Saudi Arabia Environment\",\"authors\":\"Rawan Abdulaziz Al-Mulhim, Lama Alzamil, Fay Mohammed Al-Dossary\",\"doi\":\"10.47277/ijcncs/8(3)1\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Even though cyber-attacks can’t be compared to a nuclear attack but they both pose a serious threat to national and international security. As we witness today cyberwarfare is increasing and Saudi Arabia has become a major target of Cyber-attacks as a result of its economic and digital revolution, high technology adoption and the growth of the gas and oil industry. This paper presents, a case study of the cyber-attacks on the Saudi environment. We focused on two specific malwares Shamoon and Mamba Ransomware. It also explores their methodologies and structure for future defense.\",\"PeriodicalId\":45621,\"journal\":{\"name\":\"Journal of Computer Networks and Communications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":2.0000,\"publicationDate\":\"2020-03-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Computer Networks and Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47277/ijcncs/8(3)1\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Networks and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47277/ijcncs/8(3)1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
Even though cyber-attacks can’t be compared to a nuclear attack but they both pose a serious threat to national and international security. As we witness today cyberwarfare is increasing and Saudi Arabia has become a major target of Cyber-attacks as a result of its economic and digital revolution, high technology adoption and the growth of the gas and oil industry. This paper presents, a case study of the cyber-attacks on the Saudi environment. We focused on two specific malwares Shamoon and Mamba Ransomware. It also explores their methodologies and structure for future defense.
期刊介绍:
The Journal of Computer Networks and Communications publishes articles, both theoretical and practical, investigating computer networks and communications. Articles explore the architectures, protocols, and applications for networks across the full spectrum of sizes (LAN, PAN, MAN, WAN…) and uses (SAN, EPN, VPN…). Investigations related to topical areas of research are especially encouraged, including mobile and wireless networks, cloud and fog computing, the Internet of Things, and next generation technologies. Submission of original research, and focused review articles, is welcomed from both academic and commercial communities.