Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Cybercrime investigation in Saudian Corporates

Learning Outcomes: At the end of the assignment, student should be able:

• To have an understanding of the different cybercrimes committed in Saudi Arabia law

• To understand how these crimes will be investigated under Saudi anti cybercrime law?

• Which sections of cybercrime law will be applied to different cybercrimes based on their nature, occurrence and type?

Company Name: (Choose any Saudian Company)

Example: Aramco Says Cyberattack Was Aimed at Production

JEDDAH, Saudi Arabia (Reuters) - Saudi Arabia's national oil company, Aramco, said on Sunday that a cyberattack against it in August that damaged some 30,000 computers was aimed at stopping oil and gas production in Saudi Arabia, the biggest exporter in the Organization of the Petroleum Exporting Countries.

The attack on Saudi Aramco - which supplies a tenth of the world's oil - failed to disrupt production, but was one of the most destructive hacker strikes against a single business.

"The main target in this attack was to stop the flow of oil and gas to local and international markets and thank God they were not able to achieve their goals," Abdullah al-Saadan, Aramco's vice president for corporate planning, said on Al Ekhbariya television. It was Aramco's first comments on the apparent aim of the attack.

Hackers from a group called Cutting Sword of Justice claimed responsibility for the attack, saying that their motives were political and that the virus gave them access to documents from Aramco's computers, which they threatened to release. No documents have yet been published.

Aramco and the Saudi Interior Ministry are investigating the attack. A ministry spokesman, Maj. Gen. Mansour al-Turki, said the attackers were an organized group operating from countries on four continents.

The attack used a computer virus known as Shamoon, which infected workstations on Aug. 15. The company shut its main internal network for more than a week. General Turki said the investigation had not shown any involvement by Aramco employees. He said he could not give more details because the investigation was not complete.

Shamoon spread through Aramco's network and wiped computers' hard drives clean. Aramco said damage was limited to office computers and did not affect systems software that might harm technical operations.

General Assumptions

• The cybercrime selected must have a proper reference and link to check its validity.
• The cybercrime must have occurred in Saudi corporate sector.
• The cybercrime can related to any corporate either private or public

Individual Deliverables (Research & Documentation by individual members)

1. Corporate background and its details related to its function and operations?

2. Type and nature of cybercrime occurred and also its causes? And how much damage it caused to the corporate?

3. Type of sections of Saudi anti cybercrime law applied to different cybercrimes occurred in corporate based on their nature, occurrence and type?

4. Explain the whole Forensics process applied to specific cybercrime to justify that it has been committed and has damaged the corporate?

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92033494
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Management Information System

Assignmentplease take advantage of the outside sources

Assignment Please take advantage of the outside sources provided to help you with your assignment. Submit as a Word Document. You will need to answer the following questions in a 600-word response (total for all four que ...

Topicwe all had the unfortunate experience of seeing how

Topic: We all had the unfortunate experience of seeing how computers can, at times, make life's journey a bit more difficult. This is especially true in knowledge centric workplaces. Describe an example of a very poorly ...

For this assignment research the internet or strayer

For this assignment, research the Internet or Strayer databases for information related to improper assumptions concerning accounting information systems. Write a five to seven (5-7) page paper in which you: Based on you ...

In this assignment please use your own words to explain

In this assignment, please use your own words to explain what is net neutrality? Analyzing what are pro and con on this issue? Where are pressures and ethical issues related to net neutrality? What is your conclusions. P ...

In your role as information security consultant create a

In your role as information security consultant, create a strategy for an effective user training, access, and account management program for the project organization. This strategy should include the following component ...

Please answer each question and cite any sources used1

Please answer Each question, and cite any sources used. 1. Review: Guide for Developing Security Plans for Federal Information Systems By Marianne Swanson and Joan Hash and Pauline Bowen. How does the the approach of inf ...

Question suppose that in a divide and conquer algorithm we

Question : Suppose that, in a divide and conquer algorithm, we divide an instance of size n of a problem into 16 sub instances of size n/4 and the dividing takes O(1) time (you may ignore this step). Then we combine the ...

Discussion conflict with teamspart 1 conflict within

Discussion Conflict with Teams Part 1: Conflict within Teams Think of a conflict that occurred in a team you were a part of and analyze it. What were the main sources of the conflict? What interventions can be used to im ...

Discussion questionchoose one of the questions listed below

Discussion Question Choose one of the questions listed below and respond in your main post, following the instructions below. Reply to two other colleague's posts. 1.- Division of Labor - Chapter 1 Provide an example of ...

Question provide an explanation of ifwherehow does active

Question : Provide an explanation of if/where/how does Active Directory support network security,14 pages (2,000-2,500) in APA format. Include abstract and conclusion. Do not include wikis, message boards, support forums ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As