Preparedness of Saudi Arabia to Defend Against Cyber Crimes: An Assessment with Reference to Anti-Cyber Crime Law and GCI Index
DOI:
https://doi.org/10.14738/abr.612.5771Keywords:
Cyber-crime, cyber-security, global cyber-security index, Saudi anti-cybercrimes lawAbstract
With the increasing popularity of ICT, cyber-crimes have increased rapidly. Countries across the globe have made the necessary interventions to ensure cyber-security. Saudi Arabia has been the worst victim of cyber-crimes in the Gulf region. This article investigates the preparedness of Saudi Arabia to defend itself against cyber-crimes. In order to combat against cyber-crimes, Saudi Arabia formed the anti-cybercrimes law in 2007. Global Cyber-security Index of 2017 has placed Saudi Arabia in the maturing stage behind the leading nations. Anti-cybercrimes law covers essential areas to fight against cyber-crimes and states their punishments. However, it is found to be deficient to protect against identity theft, invasion of privacy, cyber-bullying etc. This research finds Saudi Arabia semi-prepared to defend itself against cyber-crimes. In order to be among the leading nations of cyber-security; Saudi Arabia needs to strengthen its anti-cybercrimes law, cyber-security regulations and national cyber-security authority. It needs to develop cyber-security strategy, standards, metrics and R&D programs. It should promote home-grown cyber-security industry, incentivize cyber-security companies and enter into multi-lateral agreements.
References
ACCL (2007, March 26). Saudi Anti-Cyber Crime Law. Retrieved from https://www.boe.gov.sa/
Almerdas, S. (2014). The Criminalisation of Identity Theft under the Saudi Anti-Cybercrime Law 2007. Journal of International Commercial Law and Technology, 9(2), 80-93.
Arab News (2017, September 30). Study: 60% of Saudi institutions hit by virus attacks, malware. Retrieved from http://www.arabnews.com/
Bhunia, P. (2017, October 27). Singapore enters into seventh bilateral agreement on cyber-security cooperation. Retrieved from https://www.opengovasia.com/
Boni, W.C., & Kovacich, G.L. (1999). I-Way Robbery: Crime on the Internet. 1st ed. UK: Butterworth Heinemann.
Bronk, C. & Tikk-Ringas, E. (2013). The Cyber Attack on Saudi Aramco. Survival: Global Politics and Strategy, 5(22), 81-86. https://doi.org/10.1080/00396338.2013.784468
Bureau of Political-Military Affairs. (2018, March 23). U.S. Security Cooperation With Saudi Arabia. Retrieved from https://www.state.gov/
Center for International Communication (2017, November 1). Saudi Arabia Sets Up Cyber Security Authority To Boost National Security. Retrieved from https://cic.org.sa/
CERT-SA (2018). Computer Emergency Response Team for Saudi Arabia. Retrieved from https://www.cybersecurityintelligence.com/
Cisco (2017, June 7). The Zettabyte Era: Trends and Analysis. Retrieved from https://www.cisco.com/c/en/us/solutions/
Council of Europe (2015, September 4). GLACY support to Mauritius: Judicial training courses on cybercrime delivered. Retrieved from https://www.coe.int/en/
Cyber Security Assessment Netherlands (2018, August 7). Retrieved from https://www.ncsc.nl/english/
Esidross (2018). Retrieved from https://www.esidross.lv/category/bezmaksas-risinajumi/page/2/
Financial Express (2017, July 13). UN cyber security index 2017: At 23rd, India ahead of Germany, China, but Singapore on top. Retrieved from https://www.financialexpress.com/
Floyd, J.T. (2006, March 8). A Guide to Cyber Crime Laws. Retrieved from https://www.johntfloyd.com/
Forbes Middle East (2018, March 28). Arab Countries Facing The Highest Number Of Cyber Attacks. Retrieved from https://www.forbesmiddleeast.com/en/
GCI (2017). Global Cyber-security Index 2017. Retrieved from https://www.itu.int/en/
HachRead (2015, August 17). Hackers Target Saudi Government Websites with “Good Intentions”. Retrieved from https://www.hackread.com/
Halder, D., & Jaishankar, K. (2011). Cyber-crime and the Victimization of Women: Laws, Rights and Regulations. Hershey, PA, USA: IGI Global. https://doi.org/10.4018/978-1-60960-830-9
Hathaway, M., Spidalieri, F., & Alsowalim, F. (2018, September). Kingdom of Saudi Arabia: Cyber Readiness at a Glance. Retrieved from http://www.potomacinstitute.org/
Hunt, G. (2016, February 24). Ireland can be cyber-security capital of the world – report. Retrieved from https://www.siliconrepublic.com/
ICT Facts & Figures (2017). New data visualization on Internet users by region and country, 2010-2016. Retrieved from https://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx
IIROC (2015). Cyber-security Best Practices Guide - For IIROC Dealer Members. Retrieved from http://www.iiroc.ca/
Infocomm Media Development Authority (2017, November 3). Internet Content Regulation. Retrieved from https://www.imda.gov.sg/
Kaspersky Lab (2017, March 7). From Shamoon to Stonedrill - Wipers attacking Saudi organizations and beyond. Retrieved from https://media.kasperskycontenthub.com/
Masters, G. (2017, June 26). Loss from cybercrime exceeded $1.3B in 2016, FBI report. Retrieved from https://www.scmagazine.com/
Ministry of Communications & Information Technology (2012). Cybercrime Costs Saudi Arabia SR 2.6 Bn A Year. Retrieved from https://www.mcit.gov.sa/en/
MoFA (2016, December 5). Doctrine of Information Security of the Russian Federation. Retrieved from http://www.mid.ru/en
National Research Foundation (2018, January 15). National Cyber-security R&D Programme. Retrieved from https://www.nrf.gov.sg/
NATLEX (2015). Saudi Arabia - Elimination of child labor, protection of children and young persons. Retrieved from http://www.ilo.org/
New Zealand’s Cyber Security Strategy (2016). Action Plan Annual Report. Retrieved from https://www.dpmc.govt.nz/
O’Brien, D. (2017, July). Internet Security Threat Report: Ransomware 2017. Retrieved from https://www.symantec.com/
Omanua (2018). Oman Digital Strategy. Retrieved from http://www.oman.om/
Pitts, V. (2016). Cyber Crimes: History of World’s Worst Cyber Attacks. 1st ed. India: Alpha Editions.
Reuters (2017, November 1). Saudi Arabia sets up new authority for cyber security. Retrieved from https://www.reuters.com/
Sadowsky, G., Zambrano, R., & Dandjinou, P. (2004). Internet Governance: A Discussion Document. In D. MacLean, Internet Governance: A Grand Collaboration. New York, USA: United Nations ICT Task Force
Saudi Arabian Monetary Authority (2017, May). Cyber Security Framework. Retrieved from http://www.sama.gov.sa/en-US/
Saudi Gazette (2018, March 10). Saudi Arabia, UK announce strategic partnership in joint communiqué. Retrieved from http://saudigazette.com.sa/
Shierka, I., Morgus, R., Hohmann, M. & Maurer, T. (2015, May). CSIRT Basics for Policy-Makers - The History, Types & Culture of Computer Security Incident Response Teams. Retrieved from http://www.digitaldebates.org/
Smith (2017, January 24). Saudi Arabia again hit with disk-wiping malware Shamoon 2. Retrieved from https://www.csoonline.com/
Solomon, H. (2016, August 16). Ottawa announces public consultation on cyber security strategy. Retrieved from https://www.itworldcanada.com/
Sutton, M. (2018, March 17). Cyber-attack on Saudi plant designed to cause explosion. Retrieved from http://www.itp.net/
Swedish Civil Contingencies Agency (2015, March 19). Nordic cyber security exercise was conducted in Linköping. Retrieved from https://www.msb.se/en/
UK Government (2016). National Cyber Security Strategy 2016 to 2021. Retrieved from https://www.gov.uk/
Walker, J. (2017, November 23). APT targeting Saudi Arabian government. Retrieved from https://portswigger.net/