咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Enhancing Cybersecurity Compet... 收藏

Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia:A Fuzzy Decision-Making Approach

作     者:Wajdi Alhakami 

作者机构:Department of Information TechnologyCollege of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2024年第79卷第5期

页      面:3211-3237页

核心收录:

学科分类:0839[工学-网络空间安全] 08[工学] 

基  金:Taif University Taif Saudi Arabia project No.(TUDSPP-2024-121) 

主  题:Cyber security fuzzy DMTAEL security policy cyber crime MCDM 

摘      要:The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in *** has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and *** widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces *** constantly evolving cyber threats are a topic that is generating a lot of *** this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the *** existing legislative framework and measures in the KSA are geared toward deterring criminal activity *** competency models have been devised to address the necessary cybercrime competencies in this *** research specialists in this domain can benefit more by developing a master competency level for achieving optimum *** address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(***),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security *** similarities and differences between the three methods are also *** cybersecurity analysis determined that the National Cyber Security Centre got the highest *** study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for ***,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare.

读者评论 与其他读者分享你的观点