Saudi Arabia's response to cyber conflict: A case study of the Shamoon malware incident
This is a progress report on a case study of cyber-security at mega-size companies and its importance to the financial and operational well-being of the company. Our investigation focuses specifically on Saudi Aramco, the world's largest oil company. The company was the target of a severe cyber...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 75 |
---|---|
container_issue | |
container_start_page | 73 |
container_title | |
container_volume | |
creator | Dehlawi, Zakariya Abokhodair, Norah |
description | This is a progress report on a case study of cyber-security at mega-size companies and its importance to the financial and operational well-being of the company. Our investigation focuses specifically on Saudi Aramco, the world's largest oil company. The company was the target of a severe cyber-attack on August 15, 2012 that paralyzed their business network for several months. We analyze the company's response to the attack and examine its current policies with regard to cyber-security. Our goal is to answer the main research question: How the Saudi Government, the primary stakeholder of Saudi Aramco, reacted and responded to the attack and how this response conforms to current cyber-security standards. The objective is to develop a best-practices benchmark of cyber-security that provides guidelines to be utilized by Saudi Aramco and similar companies. |
doi_str_mv | 10.1109/ISI.2013.6578789 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6578789</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6578789</ieee_id><sourcerecordid>6578789</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-ea6921d932bdd89d9a6233d9051187f3831e9f59c2e362c0c297b763084c23853</originalsourceid><addsrcrecordid>eNo1kMtLxDAYxCMiqGvvgpfcPLXm0ebhrSw-CgsequhtSZOvbKSPJcki-99bcD0Nw_AbmEHolpKCUqIfmrYpGKG8EJVUUukzlGmpaCkkF4wydo6u_035dYmyGL8JIQsqOGVX6LM1B-dxHUznzX3EAeJ-niLgNGN77CBgO0_94G16xDW2ZkliOrgjnnucdoDbnRnnecKjGX5MAOwn6x1M6QZd9GaIkJ10hT6en97Xr_nm7aVZ15vcU1mlHIzQjDrNWeec0k4bwTh3mlSUKtlzxSnovtKWwbLAEsu07KTgRJWWcVXxFbr76_UAsN0HP5pw3J6-4L_6tVDh</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Saudi Arabia's response to cyber conflict: A case study of the Shamoon malware incident</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Dehlawi, Zakariya ; Abokhodair, Norah</creator><creatorcontrib>Dehlawi, Zakariya ; Abokhodair, Norah</creatorcontrib><description>This is a progress report on a case study of cyber-security at mega-size companies and its importance to the financial and operational well-being of the company. Our investigation focuses specifically on Saudi Aramco, the world's largest oil company. The company was the target of a severe cyber-attack on August 15, 2012 that paralyzed their business network for several months. We analyze the company's response to the attack and examine its current policies with regard to cyber-security. Our goal is to answer the main research question: How the Saudi Government, the primary stakeholder of Saudi Aramco, reacted and responded to the attack and how this response conforms to current cyber-security standards. The objective is to develop a best-practices benchmark of cyber-security that provides guidelines to be utilized by Saudi Aramco and similar companies.</description><identifier>ISBN: 146736214X</identifier><identifier>ISBN: 9781467362146</identifier><identifier>EISBN: 9781467362122</identifier><identifier>EISBN: 1467362123</identifier><identifier>EISBN: 1467362131</identifier><identifier>EISBN: 9781467362139</identifier><identifier>DOI: 10.1109/ISI.2013.6578789</identifier><language>eng</language><publisher>IEEE</publisher><subject>Companies ; Computer hacking ; Cyber-security ; Cyber-warfare ; Cyberattack ; Government ; Malware ; Media ; Saudi Arabia ; Security management ; Shamoon</subject><ispartof>2013 IEEE International Conference on Intelligence and Security Informatics, 2013, p.73-75</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6578789$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6578789$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Dehlawi, Zakariya</creatorcontrib><creatorcontrib>Abokhodair, Norah</creatorcontrib><title>Saudi Arabia's response to cyber conflict: A case study of the Shamoon malware incident</title><title>2013 IEEE International Conference on Intelligence and Security Informatics</title><addtitle>ISI</addtitle><description>This is a progress report on a case study of cyber-security at mega-size companies and its importance to the financial and operational well-being of the company. Our investigation focuses specifically on Saudi Aramco, the world's largest oil company. The company was the target of a severe cyber-attack on August 15, 2012 that paralyzed their business network for several months. We analyze the company's response to the attack and examine its current policies with regard to cyber-security. Our goal is to answer the main research question: How the Saudi Government, the primary stakeholder of Saudi Aramco, reacted and responded to the attack and how this response conforms to current cyber-security standards. The objective is to develop a best-practices benchmark of cyber-security that provides guidelines to be utilized by Saudi Aramco and similar companies.</description><subject>Companies</subject><subject>Computer hacking</subject><subject>Cyber-security</subject><subject>Cyber-warfare</subject><subject>Cyberattack</subject><subject>Government</subject><subject>Malware</subject><subject>Media</subject><subject>Saudi Arabia</subject><subject>Security management</subject><subject>Shamoon</subject><isbn>146736214X</isbn><isbn>9781467362146</isbn><isbn>9781467362122</isbn><isbn>1467362123</isbn><isbn>1467362131</isbn><isbn>9781467362139</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2013</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1kMtLxDAYxCMiqGvvgpfcPLXm0ebhrSw-CgsequhtSZOvbKSPJcki-99bcD0Nw_AbmEHolpKCUqIfmrYpGKG8EJVUUukzlGmpaCkkF4wydo6u_035dYmyGL8JIQsqOGVX6LM1B-dxHUznzX3EAeJ-niLgNGN77CBgO0_94G16xDW2ZkliOrgjnnucdoDbnRnnecKjGX5MAOwn6x1M6QZd9GaIkJ10hT6en97Xr_nm7aVZ15vcU1mlHIzQjDrNWeec0k4bwTh3mlSUKtlzxSnovtKWwbLAEsu07KTgRJWWcVXxFbr76_UAsN0HP5pw3J6-4L_6tVDh</recordid><startdate>201306</startdate><enddate>201306</enddate><creator>Dehlawi, Zakariya</creator><creator>Abokhodair, Norah</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201306</creationdate><title>Saudi Arabia's response to cyber conflict: A case study of the Shamoon malware incident</title><author>Dehlawi, Zakariya ; Abokhodair, Norah</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-ea6921d932bdd89d9a6233d9051187f3831e9f59c2e362c0c297b763084c23853</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Companies</topic><topic>Computer hacking</topic><topic>Cyber-security</topic><topic>Cyber-warfare</topic><topic>Cyberattack</topic><topic>Government</topic><topic>Malware</topic><topic>Media</topic><topic>Saudi Arabia</topic><topic>Security management</topic><topic>Shamoon</topic><toplevel>online_resources</toplevel><creatorcontrib>Dehlawi, Zakariya</creatorcontrib><creatorcontrib>Abokhodair, Norah</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Dehlawi, Zakariya</au><au>Abokhodair, Norah</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Saudi Arabia's response to cyber conflict: A case study of the Shamoon malware incident</atitle><btitle>2013 IEEE International Conference on Intelligence and Security Informatics</btitle><stitle>ISI</stitle><date>2013-06</date><risdate>2013</risdate><spage>73</spage><epage>75</epage><pages>73-75</pages><isbn>146736214X</isbn><isbn>9781467362146</isbn><eisbn>9781467362122</eisbn><eisbn>1467362123</eisbn><eisbn>1467362131</eisbn><eisbn>9781467362139</eisbn><abstract>This is a progress report on a case study of cyber-security at mega-size companies and its importance to the financial and operational well-being of the company. Our investigation focuses specifically on Saudi Aramco, the world's largest oil company. The company was the target of a severe cyber-attack on August 15, 2012 that paralyzed their business network for several months. We analyze the company's response to the attack and examine its current policies with regard to cyber-security. Our goal is to answer the main research question: How the Saudi Government, the primary stakeholder of Saudi Aramco, reacted and responded to the attack and how this response conforms to current cyber-security standards. The objective is to develop a best-practices benchmark of cyber-security that provides guidelines to be utilized by Saudi Aramco and similar companies.</abstract><pub>IEEE</pub><doi>10.1109/ISI.2013.6578789</doi><tpages>3</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 146736214X |
ispartof | 2013 IEEE International Conference on Intelligence and Security Informatics, 2013, p.73-75 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6578789 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Companies Computer hacking Cyber-security Cyber-warfare Cyberattack Government Malware Media Saudi Arabia Security management Shamoon |
title | Saudi Arabia's response to cyber conflict: A case study of the Shamoon malware incident |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T13%3A04%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Saudi%20Arabia's%20response%20to%20cyber%20conflict:%20A%20case%20study%20of%20the%20Shamoon%20malware%20incident&rft.btitle=2013%20IEEE%20International%20Conference%20on%20Intelligence%20and%20Security%20Informatics&rft.au=Dehlawi,%20Zakariya&rft.date=2013-06&rft.spage=73&rft.epage=75&rft.pages=73-75&rft.isbn=146736214X&rft.isbn_list=9781467362146&rft_id=info:doi/10.1109/ISI.2013.6578789&rft_dat=%3Cieee_6IE%3E6578789%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781467362122&rft.eisbn_list=1467362123&rft.eisbn_list=1467362131&rft.eisbn_list=9781467362139&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6578789&rfr_iscdi=true |