Risks & Vulnerabilities to IT Systems in the UAE

With the advent of technology, information systems are highly susceptible to risks and vulnerabilities. Therefore, to ensure that their networks are fully secured, majority of them have developed various policies and also developed various operational procedures. These measures have proved to be ver...

Full description

Saved in:
Bibliographic Details
Main Author: FULAD, HIND KHALID (author)
Published: 2024
Subjects:
Online Access:https://bspace.buid.ac.ae/handle/1234/2731
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1862980611616014336
author FULAD, HIND KHALID
author_facet FULAD, HIND KHALID
author_role author
dc.contributor.none.fl_str_mv Dr Maria Papadaki
dc.creator.none.fl_str_mv FULAD, HIND KHALID
dc.date.none.fl_str_mv 2024-12
2025-01-15T08:40:55Z
2025-01-15T08:40:55Z
dc.format.none.fl_str_mv application/pdf
dc.identifier.none.fl_str_mv 20170766
https://bspace.buid.ac.ae/handle/1234/2731
dc.language.none.fl_str_mv en
dc.publisher.none.fl_str_mv The British University in Dubai (BUiD)
dc.subject.none.fl_str_mv vulnerability, risks, resilience, mitigation
dc.title.none.fl_str_mv Risks & Vulnerabilities to IT Systems in the UAE
dc.type.none.fl_str_mv Dissertation
description With the advent of technology, information systems are highly susceptible to risks and vulnerabilities. Therefore, to ensure that their networks are fully secured, majority of them have developed various policies and also developed various operational procedures. These measures have proved to be very effective in countering the risks and vulnerabilities encountered by their software and other applications. Today, organizations are committing a lot of resources to facilitate risk management. The process of dealing with these vulnerabilities begins with knowing these associated risks and threats to both the hardware and software. This research provides a comprehensive overview of the risks and vulnerabilities of the IT systems in the UAE Government and how companies handle various security challenges that they encounter on a daily basis. The study further shows how many UAE companies are increasingly recognizing the impending threats of information system’s vulnerabilities, although they are still reluctant to implement the appropriate security measures. Additionally, the study provides recommendations of appropriate security measures that can be set up to ensure the issues are addressed.
id budr_dd6e329bccf0408ec80a86c0dba7337a
identifier_str_mv 20170766
language_invalid_str_mv en
network_acronym_str budr
network_name_str The British University in Dubai repository
oai_identifier_str oai:bspace.buid.ac.ae:1234/2731
publishDate 2024
publisher.none.fl_str_mv The British University in Dubai (BUiD)
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
spelling Risks & Vulnerabilities to IT Systems in the UAEFULAD, HIND KHALIDvulnerability, risks, resilience, mitigationWith the advent of technology, information systems are highly susceptible to risks and vulnerabilities. Therefore, to ensure that their networks are fully secured, majority of them have developed various policies and also developed various operational procedures. These measures have proved to be very effective in countering the risks and vulnerabilities encountered by their software and other applications. Today, organizations are committing a lot of resources to facilitate risk management. The process of dealing with these vulnerabilities begins with knowing these associated risks and threats to both the hardware and software. This research provides a comprehensive overview of the risks and vulnerabilities of the IT systems in the UAE Government and how companies handle various security challenges that they encounter on a daily basis. The study further shows how many UAE companies are increasingly recognizing the impending threats of information system’s vulnerabilities, although they are still reluctant to implement the appropriate security measures. Additionally, the study provides recommendations of appropriate security measures that can be set up to ensure the issues are addressed.The British University in Dubai (BUiD)Dr Maria Papadaki2025-01-15T08:40:55Z2025-01-15T08:40:55Z2024-12Dissertationapplication/pdf20170766https://bspace.buid.ac.ae/handle/1234/2731enoai:bspace.buid.ac.ae:1234/27312025-01-15T23:00:20Z
spellingShingle Risks & Vulnerabilities to IT Systems in the UAE
FULAD, HIND KHALID
vulnerability, risks, resilience, mitigation
title Risks & Vulnerabilities to IT Systems in the UAE
title_full Risks & Vulnerabilities to IT Systems in the UAE
title_fullStr Risks & Vulnerabilities to IT Systems in the UAE
title_full_unstemmed Risks & Vulnerabilities to IT Systems in the UAE
title_short Risks & Vulnerabilities to IT Systems in the UAE
title_sort Risks & Vulnerabilities to IT Systems in the UAE
topic vulnerability, risks, resilience, mitigation
url https://bspace.buid.ac.ae/handle/1234/2731