Risks & Vulnerabilities to IT Systems in the UAE

Loading...
Thumbnail Image
Date
2024-12
Journal Title
Journal ISSN
Volume Title
Publisher
The British University in Dubai (BUiD)
Abstract
With the advent of technology, information systems are highly susceptible to risks and vulnerabilities. Therefore, to ensure that their networks are fully secured, majority of them have developed various policies and also developed various operational procedures. These measures have proved to be very effective in countering the risks and vulnerabilities encountered by their software and other applications. Today, organizations are committing a lot of resources to facilitate risk management. The process of dealing with these vulnerabilities begins with knowing these associated risks and threats to both the hardware and software. This research provides a comprehensive overview of the risks and vulnerabilities of the IT systems in the UAE Government and how companies handle various security challenges that they encounter on a daily basis. The study further shows how many UAE companies are increasingly recognizing the impending threats of information system’s vulnerabilities, although they are still reluctant to implement the appropriate security measures. Additionally, the study provides recommendations of appropriate security measures that can be set up to ensure the issues are addressed.
Description
Keywords
vulnerability, risks, resilience, mitigation
Citation