Risks & Vulnerabilities to IT Systems in the UAE

dc.contributor.advisorDr Maria Papadaki
dc.contributor.authorFULAD, HIND KHALID
dc.date.accessioned2025-01-15T08:40:55Z
dc.date.available2025-01-15T08:40:55Z
dc.date.issued2024-12
dc.description.abstractWith the advent of technology, information systems are highly susceptible to risks and vulnerabilities. Therefore, to ensure that their networks are fully secured, majority of them have developed various policies and also developed various operational procedures. These measures have proved to be very effective in countering the risks and vulnerabilities encountered by their software and other applications. Today, organizations are committing a lot of resources to facilitate risk management. The process of dealing with these vulnerabilities begins with knowing these associated risks and threats to both the hardware and software. This research provides a comprehensive overview of the risks and vulnerabilities of the IT systems in the UAE Government and how companies handle various security challenges that they encounter on a daily basis. The study further shows how many UAE companies are increasingly recognizing the impending threats of information system’s vulnerabilities, although they are still reluctant to implement the appropriate security measures. Additionally, the study provides recommendations of appropriate security measures that can be set up to ensure the issues are addressed.
dc.identifier.other20170766
dc.identifier.urihttps://bspace.buid.ac.ae/handle/1234/2731
dc.language.isoen
dc.publisherThe British University in Dubai (BUiD)
dc.subjectvulnerability, risks, resilience, mitigation
dc.titleRisks & Vulnerabilities to IT Systems in the UAE
dc.typeDissertation
Files