Sunday, February 24, 2019

Cyber Security at NIC

National information center (NIC) which is an important sector that has data of country citizens and residents to store and provide them to other governments sectors. The high quality and safety in the network between sectors are required. A large group of end-users from a variety of users required closed links to provide protected communications network which is Local Area Network (LAN) to link the servers with other sectors based on the required connections and access authority. (Brown, DeHayes, Hoffer, Martin, & Perkins, 2012).
The attempts of cyber-attack of the programs of NIC had failed. Those who say that they have no attempts of cyber-attack, their system or cite means that either there have attempted and they do not know about them, or there are no cyber-attack attempts because the system is not important.
The electronic infrastructure of NIC must have attempted to penetrate, but we do not show these attempts to attackers and what we know about them, and to know that there are no successful breakthroughs for the infrastructure of NIC. NIC is built of layers so that there is continuous protection, the National Center for Electronic Security and security expertise inside and outside Saudi Arabia.

Sometimes, specific Topology needed to be changed or developed based on a load of processing data, or the types of networking required to the business. (Alderson, Li Willinger, & Doyle, 2005).
Alderson, D., Li, L., Willinger, W., & Doyle, J. (2005). Understanding Internet topology: principles, models, and validation. IEEE/ACM Transactions on Networking, 13(6), 1205-1218. doi:10.1109/tnet.2005.861250
Blass, G. D. and D. Plocher (1991). “Finding Government Information: The Federal Information Locator System (FILS),” Government Information Quarterly, vol. 8, no. 1, pp. 11-32.
Brown, C. V., DeHayes, D. W., Hoffer, J. A., Martin, W. W., & Perkins, W. C. (2012). Managing information technology (7th ed.). Upper Saddle River, NJ: Pearson Prentice Hall.
International Organization for Standardization (2003). ISO 14721:2002 Space data and information transfer systems – Open archival information system – Reference model, 1st ed., Geneva, CH, International Organization for Standardization.
Ministry of Interior. (2007). National Information Center. Retrieved from

Saturday, February 23, 2019

Adobe Cyber Security Attack

Cybersecurity and Risk Management
Adobe is one of the companies that faced a cyber-attack in recent years. In 2013, Adobe admitted that cyber attackers had gained access to the data of 2.9 million customers. Adobe is a software company characterised as a key target by cyber attackers. The attack led to the removal of certain information regarding its customers. The company reported the loss of customer names, encrypted credit and debit cards, as well as other details regarding the orders made by customers (Rauch, 2017). Further reports emerged that the attackers had gained hold of important source code for different software such as Adobe Acrobat and Cold Fusion. Adobe’s official announcement regarding the attack confirmed that the company was taking measures to ascertain whether the attackers were using the information on other platforms (Öbrand, Holmström, & Newman, 2018).
The company’s public disclosure made it evident that Adobe customers needed to worry because the cyber attackers had the potential of using the data in continuous and strategic attacks. The company responded effectively by highlighting the measures it was taking to protect customers from further losses (Vincent, Higgs, & Pinsker, 2017). Notably, the attack compromised some of the customers’ orders, which was a major disadvantage for the company. The other loses included the potential use of the company’s source code to stage further attacks in the future. To mitigate the risks of future attacks, Adobe adopted a more complex encryption process as a way of protecting customer information. As a business manager, I would recommend a better security system for Adobe that can protect both customer information as well as the company’s source codes (Kelly, 2017).
Kelly, S. (2017). Fighting the Cyber Threat. Public Utilities Fortnightly, 155(1).
Öbrand, L., Holmström, J., & Newman, M. (2018). Navigating Rumsfeld’s quadrants: A performative perspective on IT risk management. Technology in Society, 53, 1–8.
Rauch, R. (2017). 4 keys to cyber threat detection. Retrieved February 5, 2019, from
Vincent, N. E., Higgs, J. L., & Pinsker, R. E. (2017). IT Governance and the Maturity of IT Risk Management Practices. Journal of Information Systems, 31(1), 59–77.

Featured Post

Johns Hopkins Aramco Healthcare Business Case Study

Business Case:   Johns Hopkins Aramco Healthcare    Operations Management Report   Table of Content...