Hacking countermeasure framework for oman computer emergency readiness team using delphi approach

dc.contributor.authorAl-Wahaibi, Said Bin Khalfan
dc.date.accessioned2023-08-21T01:16:55Z
dc.date.available2023-08-21T01:16:55Z
dc.date.issued2022
dc.descriptionThesis (PhD. (Computer Science))
dc.description.abstractRecent security attacks have breached some of the most secure networks around the world causing damages, stealing information, and data corruption. This devastating situation has led security experts to question the effectiveness and reliability of the present security controls against the hacking attacks. Thus, there is a need to prevent systems hacking and fulfil managerial concerns about security risks. This research focuses on the design and development of Hacking Countermeasure Framework (HCF) using Delphi method that combines quantitative and qualitative research questionnaires to address problems associated with the lack of hacking anticipation, hiding and deception, and Defense-in-Breadth (DiB) techniques. This research was conducted via an online, anonymous, and asynchronous six-round Delphi methodology adapted from the classical Delphi method with a pre-selected security experts panel. The study was arranged in four Delphi phases. Phase one covers analysis of studies that have used pre-Delphi to explore hacking threats and the provided recommendations for anti-hacking. Phase two covers derivation of factors for identifying anti-hacking factors and their relationships. Phase three covers development of a framework to prevent systems hacking and fulfil managerial concerns regarding security risks. Finally, phase four covers validation of the research deliverables using triangulation with five processes, namely study cases, interviews, discussion workshop, review and quality assurance by cyber security experts, and approval by CERTs. The findings of this research confirms the importance of hacking anticipation, hiding and deception, and DiB in a hacking countermeasure process and provides enticing clues regarding the role of these three factors in the hacking countermeasures. Despite recent calls for the replacement of Defense-in-Depth (DiD), this research also confirms that DiD plays a vital role in anti-hacking processes. Moreover, a clear linkage is identified between hacking risk assessment, anti-hacking auditing, and anti-hacking compliance. Furthermore, the validation of framework confirms that hacking countermeasure improves through the induced solutions for DiB, and deception and hiding techniques. The HCF is useful for both academia and industry and can contribute to theory and practice of hacking anticipation, DiB, and hiding and deception
dc.description.sponsorshipFaculty of Engineering - School of Computing
dc.identifier.citationNA
dc.identifier.issnNA
dc.identifier.urihttp://openscience.utm.my/handle/123456789/605
dc.language.isoen
dc.publisherUniversiti Teknologi Malaysia
dc.relation.ispartofseriesNA; NA
dc.subjectComputer fraud
dc.titleHacking countermeasure framework for oman computer emergency readiness team using delphi approach
dc.typeThesis
dc.typeDataset
Files
Original bundle
Now showing 1 - 3 of 3
Loading...
Thumbnail Image
Name:
SaidBinKhalfanPSC2022_D.pdf
Size:
266.52 KB
Format:
Adobe Portable Document Format
Description:
SAMPLE DATA COLLECTION
Loading...
Thumbnail Image
Name:
SaidBinKhalfanPSC2022_C.pdf
Size:
691.2 KB
Format:
Adobe Portable Document Format
Description:
STUDY CASE AND DOCUMENTS FOR FINAL RESEARCH VALIDATION
Loading...
Thumbnail Image
Name:
SaidBinKhalfanPSC2022_A.pdf
Size:
485.58 KB
Format:
Adobe Portable Document Format
Description:
DEFINITIONS AND PREVIOUS STUDIES
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description: