European Journal of Computer Science and Information Technology (EJCSIT)

EA Journals

Cybersecurity

Effects of People’s Mental Models of Cybersecurity on their Security Behaviour (Published)

This research investigates the effects of people’s mental modal of cybersecurity on their security behaviour. Data were collected using survey design and the questions were measured on a Likert five point-scale. The questionnaires were distributed to mainly IT staff, management staff and other staff that uses computers in the discharge of their duties. The data were analysed using percentages, frequencies and statistical methods of regression and ANOVA while Cronbach Alpha reliability coefficient technique was adopted to test the validity of the questions used to collect primary data. The result reveals that people’s prior knowledge of cybersecurity issues has no effect on people’s mental models for improved cybersecurity behaviour, but lack of trained staff (cyber talents), lack of supportive infrastructures, time constraints, exclusion of cybersecurity in non-computing courses, poor knowledge of fundamental computing areas, lack of mentors with hands-on experience, lack of cyber training or challenge programme, and inadequate books on cyber security were admitted by the participants as some of the major factors that inhibit their knowledge and engagement in cybersecurity education. These barriers if not checked could limit the level of cybersecurity awareness among undergraduate students.

Keywords: Cybersecurity, Mental Models., cyberspace, security behaviour

Utilization of Security Techniques for Cyber Warfare: KSA (Published)

Cyber warfare is considered mysterious targets of unknown sources that move through information and communication networks worldwide and use electronic weapons targeting information technology. They are directed against vital installations or invaded by agents of the intelligence services.  Cybersecurity is one of the most significant digital technological breakthroughs that the world is now witnessing. It is considered the first weapon specialized in defending computers, electronic systems, and data from malicious attacks, servers, mobile devices, and networks.  As a result, the goal of this research is to determine how Saudi Arabia uses security approaches for cyber warfare. The study adopted the descriptive method which addressed several aspects related to the strategies and security techniques for cyber warfare. The results indicate that the focus on cyber that pays importance to the possible countermeasures and preventive techniques that could be used to counter the risks of attackers, and discusses the encryption and watermark measures organizations can protect data against the illegal leak and hacking.

Citation: Ohoud S. Al-Harthi, Osama S. Faragallah, and Jehad F.  Al-Amri (2021) Utilization of Security Techniques for Cyber Warfare: KSA, European Journal of Computer Science and Information Technology, Vol.9, No.4, pp.54-72,

 

 

Keywords: Cybersecurity, Encryption, cyber warfare, watermark

Scroll to Top

Don't miss any Call For Paper update from EA Journals

Fill up the form below and get notified everytime we call for new submissions for our journals.