It is divided into four main components:• You will also understand the basic controls and policies highlighted in the Basic Cybersecurity Controls Handbook, and the national programs and initiatives including the Saudi Federation for Cybersecurity and the launch of the National Academy of Cybersecurity launched by the Ministry of Communications and Information Technology | Sensitive systems controls Sensitive systems controls aim to support basic cybersecurity controls |
---|---|
The objective is to ensure information security, protection of public interest, morals, protection of rights of the legitimate use of computers and information networks, and protection of the national economy | Cloud computing controls consist of:• Executive Programs Hasseen InitiativeThe was launched to enhance Cybersecurity at the national level, and it is concerned with protecting emails from spoofing and unauthorized use |
" Accessed August 29, 2012.
National programs and initiatives The indicative Center for Cybersecurity In order to raise awareness of Cybersecurity and avoid cyber risks and reduce their effects, the has been launched to work on issuing alerts about the latest and most serious gaps, and it also works on launching awareness campaigns and programs and cooperates with other guidance centers | Cybersecurity related to external parties You can see details of controls in the |
---|---|
Effective management of cyber risks at the national level• The cybersecurity controls for sensitive systems consist of:• Third-party Cybersecurity and cloud computing• Knowing the level of implementation of the Hasseen initiative for the entity• Building national human capabilities and developing the cybersecurity industry in the Kingdom Controls and policies Basic Cybersecurity Controls In order to reduce the cyber risks on the information and technology assets of the entities at the internal or external level, the authority has worked on 114 basic cybersecurity officers divided into five main components:• Saudi Federation for CyberSecurity For the sake of local professional capabilities in Cybersecurity, software development, and drones, the was launched under the Saudi Olympic Committee's umbrella | Cybersecurity Legislation The aims at preventing cybercrimes by identifying such crimes and defining their punishments |
Strengthening partnerships and cooperation in Cybersecurity• Strengthening national capabilities in defense against cyber threats• RSA security conference, Washington, D.
3FT Special Report 7 June 2013 | Construction The national strategy aims to:• PwC Financial Services Regulatory Practice, April, 2015 |
---|---|
Office of the Press Secretary | Cybersecurity related to external parties and cloud computing Control details can be found in the |
Survey of domain name registries• " Retrieved December 4, 2005.
22