Cybersecurity for industrial control systems Control details can be found in the | National Academy of Cybersecurity An initiative launched by the Ministry of Communications and Information Technology in cooperation with the to raise the level of national digital capabilities in various fields of modern technology to keep pace with digital transformation requirements |
---|---|
Integrated cybersecurity governance at a national level• Cybersecurity Legislation The aims at preventing cybercrimes by identifying such crimes and defining their punishments | Strengthening national capabilities in defense against cyber threats• " Retrieved October 31, 2005 |
.
25" Retrieved October 31, 2005 | You will also understand the basic controls and policies highlighted in the Basic Cybersecurity Controls Handbook, and the national programs and initiatives including the Saudi Federation for Cybersecurity and the launch of the National Academy of Cybersecurity launched by the Ministry of Communications and Information Technology |
---|---|
Protection of systems and information processing equipment• FT Special Report 7 June 2013 | Sensitive systems controls Sensitive systems controls aim to support basic cybersecurity controls |
National Cybersecurity Strategy The was developed to reflect the strategic ambition of the Kingdom in a manner that is balanced between security, trust, and growth.
To provide activities and programs that contribute to increasing community awareness of Cybersecurity, programming, drones, and support and encourage young people to become professionals in this field | Strengthening partnerships and cooperation in Cybersecurity• Survey of domain name registries• Construction The national strategy aims to:• Knowing the level of implementation of the Hasseen initiative for the entity• The objective is to ensure information security, protection of public interest, morals, protection of rights of the legitimate use of computers and information networks, and protection of the national economy |
---|---|
Monitoring Cybersecurity and managing incidents You can view the details of the controls through the | Cloud computing controls Cloud computing controls come as an extension and complement to the basic cybersecurity controls and aim to define the cybersecurity requirements for cloud computing from service providers' and subscribers' perspectives to raise security and reduce cyber risks on all services and subscribers |
18 main controls and 26 subsidiary controls for subscribers.
29