Analysis of the Attacks on Saudi Web Companies

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Critical business relationships could be compromised due to using unprotected website and may affect the business reputation itself. The business's website is its brand storefront, and often it's the first contact with customers. Malicious hackers target organizations, governments, or businesses for their electronic crime. Among different hacking methods which they have, they preferred to begin with web application. It allows them to deal the most damage for the least effort. This paper present the analysis of methods of hacking web application, which hackers used in attacking most of the systems. Hackers usually performs these attacks by looking into the web overall, its architectures, and the related security risks. In addition, it discusses recent scenarios happening with perspective of the Kingdom of Saudi Arabia. As we know, hacking on Equifax website exposes data for 143 million US consumers. While focusing on Saudi market, there are 40% of companies that have been affected by internal information security incidents. At the end, a few defending methods are proposed which recommended as best practices for information security practitioners to use against hacking methods.
Original languageEnglish
Title of host publication 2018 21st Saudi Computer Society National Computer Conference (NCC)
PublisherIEEE
ISBN (Electronic)978-1-5386-4110-1
ISBN (Print)978-1-5386-4111-8
DOIs
Publication statusPublished online - 18 Dec 2018
Event2018 21st Saudi Computer Society National Computer Conference (NCC) - Riyadh, Saudi Arabia, Riyadh, Saudi Arabia
Duration: 25 Apr 201826 Apr 2018

Conference

Conference2018 21st Saudi Computer Society National Computer Conference (NCC)
CityRiyadh, Saudi Arabia
Period25/04/1826/04/18

Keywords

  • Web-Business-Application-Securtiy-Risk-Saudi-Web-Server-Authentication-Authorization-Validation-Input

Fingerprint

Dive into the research topics of 'Analysis of the Attacks on Saudi Web Companies'. Together they form a unique fingerprint.

Cite this