How much damage it caused to the corporate

Assignment Help Management Information Sys
Reference no: EM131278786

Cybercrime investigation in Saudian Corporates

Learning Outcomes: At the end of the assignment, student should be able:

• To have an understanding of the different cybercrimes committed in Saudi Arabia law

• To understand how these crimes will be investigated under Saudi anti cybercrime law?

• Which sections of cybercrime law will be applied to different cybercrimes based on their nature, occurrence and type?

Company Name: (Choose any Saudian Company)

Example: Aramco Says Cyberattack Was Aimed at Production

JEDDAH, Saudi Arabia (Reuters) - Saudi Arabia's national oil company, Aramco, said on Sunday that a cyberattack against it in August that damaged some 30,000 computers was aimed at stopping oil and gas production in Saudi Arabia, the biggest exporter in the Organization of the Petroleum Exporting Countries.

The attack on Saudi Aramco - which supplies a tenth of the world's oil - failed to disrupt production, but was one of the most destructive hacker strikes against a single business.

"The main target in this attack was to stop the flow of oil and gas to local and international markets and thank God they were not able to achieve their goals," Abdullah al-Saadan, Aramco's vice president for corporate planning, said on Al Ekhbariya television. It was Aramco's first comments on the apparent aim of the attack.

Hackers from a group called Cutting Sword of Justice claimed responsibility for the attack, saying that their motives were political and that the virus gave them access to documents from Aramco's computers, which they threatened to release. No documents have yet been published.

Aramco and the Saudi Interior Ministry are investigating the attack. A ministry spokesman, Maj. Gen. Mansour al-Turki, said the attackers were an organized group operating from countries on four continents.

The attack used a computer virus known as Shamoon, which infected workstations on Aug. 15. The company shut its main internal network for more than a week. General Turki said the investigation had not shown any involvement by Aramco employees. He said he could not give more details because the investigation was not complete.

Shamoon spread through Aramco's network and wiped computers' hard drives clean. Aramco said damage was limited to office computers and did not affect systems software that might harm technical operations.

General Assumptions

• The cybercrime selected must have a proper reference and link to check its validity.
• The cybercrime must have occurred in Saudi corporate sector.
• The cybercrime can related to any corporate either private or public

Individual Deliverables (Research & Documentation by individual members)

1. Corporate background and its details related to its function and operations?

2. Type and nature of cybercrime occurred and also its causes? And how much damage it caused to the corporate?

3. Type of sections of Saudi anti cybercrime law applied to different cybercrimes occurred in corporate based on their nature, occurrence and type?

4. Explain the whole Forensics process applied to specific cybercrime to justify that it has been committed and has damaged the corporate?

Reference no: EM131278786

Questions Cloud

In which applications are the lattice structures preferred : The parallel structure of the frequency-sampling form contains second-order sections with feedback paths. This implies that the system is a recursive system. Do you agree or disagree? Explain.
What exposure does ge face on given bid : How should General Electric establish the Swiss franc price of its $50-million bid?-  What exposure does GE face on this bid? How can it hedge that exposure?
Training and development professional : What might motivate employees to share their knowledge and skill in a personal profile on a social networking intranet portal? Why would that information be helpful to you as an HR or Training & Development professional? Be specific.
How does one obtain all-zero lattice coefficients : The all-pole lattice coefficients can be obtained using the procedure that computes all-zero lattice coefficients. Explain why?
How much damage it caused to the corporate : Type of sections of Saudi anti cybercrime law applied to different cybercrimes occurred in corporate based on their nature, occurrence and type? Explain the whole Forensics process applied to specific cybercrime to justify that it has been committ..
What is the likely impact on dells asian profit : What is the likely impact on Dell's Asian profits of a strengthened dollar? Explain.-  What hedging technique(s) can Dell employ to lock in a desired currency conversion rate for its Asian sales during the next year?
What strategic issues : What strategic issues and problems does Panera Bread management need to address? What would you suggest that Panera Bread needs to do to strengthen its competitive position vis-à-vis their competitors.
What is bell uks translation exposure : What is Bell U.K.'s translation exposure under the current/noncurrent, monetary/nonmonetary, temporal, and current rate methods?
Compare and contrast holism versus reductionism : Describe Reductionism - 2 pages, Compare and contrast Holism versus Reductionism - 1 page.

Reviews

Write a Review

 

Management Information Sys Questions & Answers

  Find the process id of the script and kill the job

Modify the program to add a trap for SIGINT and SIGTERM. Save the script and then run the script in the background. Use the jobs command to display a list of the jobs currently running.

  Explain quality and its importance to project success

Explain quality and its importance to project success.

  What procedures could you follow to minimize risk

How can information technology support a company's business processes and decision making and give it a competitive advantage? Give examples to illustrate your answer.

  Question about hr information systemsthe best hr

question about hr information systemsthe best hr information system from an employee point of view is one that is not

  Define and provide examples of soa architectures

Why is the technical architecture important to a SOA initiative and the difference between an SOA environment and a standard middleware environment?

  Compare and contrast hids and nids

Intrusion Detection Systems (IDS), which can be categorized as Host IDS (HIDS) and Network IDS (NIDS), is a means of providing real-time monitoring. Compare and contrast HIDS and NIDS, and provide at least one (1) example identifying when one (1) ..

  The company policy is to handle data network storage

an effective information technology manger must be as adept at the application of data storage techniques relative to

  Discuss the indirect costs that an it project may encounter

Discuss the indirect costs that an IT project may encounter during the execution phases. Discuss how these may be evaluated and included in the project budget during the planning phases of the project

  Decrease the overall total it budget

An increase in spending on items related to hardware, software, and outside IT support services by 4 percent and A decrease the overall total IT budget by 2 percent compared to the original total budget

  Describe briefly what services they contribute

What personal knowledge management tools does this organization utilize? What steps has this organization taken in securing their information and knowledge? What has this organization done to gain and sustain an advantage over their competitors?

  Description of computer crimeswrite an executive summary to

description of computer crimeswrite an executive summary to the board of directors that summarizes the following issues

  Discuss the erp implementation factors you have identified

Do some research on ERP implementation. Identify other factors which may account for the success of ERP implementation. Discuss the factors you have identified and explain why they are more reliable than the clichés in the original article.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd