Ijatcse 33912020
Ijatcse 33912020
ABSTRACT Relationships such as "cybercrime," "computer crime," and
"network crime" have no unanimously acknowledged
With the development of technology, modern definitions. Part of the misunderstanding arising from their
computer-assisted and Internet crimes have been increasing use originates from the circumstance that criminals now use
all this while, and there is a need to further investigate the computers in the progression of committing almost any
current status of cybercrime and computer forensics in the crime. Although there is no decided meaning of a computer
region. Saudi Arabia is one of the fastest growing countries in crime, the denotation of the tenure has developed more
the Middle East in terms of communications technologies detailed over time. A computer crime mentions principally to
such as the Internet and mobile phones. In this paper we a wide set of crimes defined in certain laws. These crimes
explore cybercrime challenges in the Middle East using Saudi comprise shoplifting of computer amenities; unsanctioned
Arabia as a case study. In particular, we examine the impact access to protected computers; software piracy and
of the use of Internet and cybercrime on adolescents in Saudi modification or stealing of warehoused information
Arabia. automatically; computer-assisted coercion; and obtaining
unauthorized access to records[3] [4] [31] [5] [29].
Keywords: crime, computer, Saudi Arabia, Forensics Circulation in pilfered passwords and broadcast of viruses or
Technology, interne, future, teenager destructive instructions also constitute a cybercrime. One of
the foremost complications in a computer crime is that when
1. INDTRODUCTION the computer or network is not directly implicated in a crime
but digital indication associated to the crime [14] .
With the development of technology, modern However, the roles played by a computer in a cybercrime can
computer-assisted and Internet crimes have been increasing be categorized in one of three ways: as a tool, as a storage
all this while. Cybercrime internationally affects the IT device, or as a victim [13].
environment to a large extent, be it management, companies,
banks or individuals[6] [9] [7]. The rapid expansion of the 2.1 Computer as a Tool
order of techniques has been observed. Information
sharing[11] [10] is a major distortion feature of The computer can be used as a tool to obligate movement
misappropriation of information on the Internet. crimes. This group embraces those crimes that criminals have
The remainder of this paper is organized as follows. Section II conventionally dedicated in the physical world but this is now
discusses the background of computer crimes. Section III lists fashionable with snowballing occurrence on the Internet,
some types of computer crimes, while Section IV explains the such as online mart deception, and pornography circulation.
forensic technology on the computer. In the V section we Criminals also use the Internet to encourage an extensive
discuss the challenges of cybercrime in the Middle East. In assortment of traditional crime environments that are not
the section VI speaks History of Internet use in Saudi Arabia. available in the “real world”, such as email and chat
In Section VII we explain computer crimes in Saudi Arabia meetings. Since criminals may use computer networks to
and in Section VIII some cases of attacks in Saudi Arabia and carry out traditional crimes in new conducts, steps must be
Section IX about cyber criminals in Saudi Arabia and in taken to assess prevailing criminal rules to guarantee that
Section X we explain anti-crime law in Saudi Arabia In what is forbidden in the physical world is correspondingly
section XI we discuss the use of adolescents for the Internet. proscribed in the computer-generated world.
In the XII section speaks of Islamic criminal law and also in
section XIII speaks that Sharia attends cybercrime and in 2.2 Computer as a Storage Device
section XIV talk about the future of cybercrime.
Criminals, such as industries, managements and persons,
2. BACKGROUND: WHAT IS CYBERCRIME? take benefit of the aptitude of computers to stockpile great
The term computer crime to refers to criminal activities quantities of information[8] [12]. Criminals stockpile
involving illegal uses of computers. The definition by information when obligating an extensive variability of
Eoghan Casey [26] is used in this paper. outdated crimes, and the electronic information develops
clues applicable to the internal working of the crime. The use
217
Reem K. Alqurashi et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(1), January – February 2020, 217 – 224
3.2 Worms
3.3 Sniffer
218
Reem K. Alqurashi et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(1), January – February 2020, 217 – 224
stem (to illegitimately shadow and wristwatch somebody) the evidence and information obtained from the investigation
[20]. are recorded immediately as a statement. In the three
progressions of indication assortment, based on the
3.8 Password Attacks continuousness attitude of e ective indication, it is
compulsory to greatest the three progressions [27].
The goal of a password attack is to also deduction a password Network interruption information, network interruption is
or become it finished trust dodges, which are recognized as typically an occurrence on a server with a huge quantity of
social engineering. And password attacks consume humble compost information, and the authentic determination of the
adventures. Most password attacks are envisioned for process is concealed in it for an incursion determination. The
contravention. However, admission container likewise communal network occurrence manner is a flood occurrence
principal to stealing and destruction. The outbreak must be that is merely uneven and di cult to preserve. The communal
cautiously deliberate and implemented. A password attack flood occurrence methods are User Datagram Protocol (UDP)
container continuously be confidential as a prearranged flood attack, Transmission Control Protocol (TCP) flood
category of mistreatment, and the universal physiognomies attack and Internet Control Messages Protocol (ICMP) flood
accompanying with this organization smear. Assumed the attack [27] .
dependence on social engineering, which is operating persons The overhead flood occurrences are all DDoS flood
in instruction to two-time them from penetrating information occurrences, which flood the server with a huge quantity of
such as passwords, the greatest credible method to attack is compost information, instigating the server to run out of
concluded individual communication. Social engineering capitals and go downhearted. The di erence amongst the
category of password attacks contributes to up to 90 % of all three DDoS flooding occurrences declared overhead
such attacks. The individual who is prospective to obligate a dishonesties in the di erent message information used for the
password attack is the individual situated neighboring the occurrence. UDP message mostly occurrences target IP
residence where the attack instigated, as an interior address. TCP mostly uses the TCP protocol to overhang a
foundation or user [33]. service. Information for demanding confirmation is
uninterruptedly sent to devour server resource. And
4. COMPUTER FORENSICS TECHNOLOGY admittance to other users is blocked. ICMP is a tra c
occurrence that devours resources by sending more than
With the speedy expansion of network technology, people's 65,535 bytes of information to the server[27].
existence has transformed melodramatically. The beginning In order to see the effectiveness of computer forensics, the
of the Internet does not deliver coziness. It also delivers a new subsequent three philosophies should be adhered to [19]:
criminal frequency that fluctuates from the outmoded 1) The crime scene is cordoned to guarantee the indication
frequency. In bright of the new network crime, computer (evidence) is not contaminated.;
forensics technology ascends at the ancient instant. Computer 2) The assortment of indication network truthfulness and
forensics is also called a criminological network study. The continuousness necessity be certain. The final indication
indication of the network crime it delivers is documented by succumbed will be the same as the final indication examined.
commandment and can be secondhand as an operative and 3) In the complete progression of suggestion assortment, there
dependable basis of sentence. The main attitude in computer requirement be a third party to administer so to safeguard the
forensics [32] is to use the appropriate network information independence of indication [27].
investigation technology to magistrate the motivation of the
crime and to accumulate the network crime data of the 5. CYBERCRIME CHALLENGES IN THE MIDDLE
suspicious specifically, which is engaged as the indication of EAST
authorized experimental [27] .
Progressive communications technologies exposed the
entrance to the development of humankind and crime. But
lawmaking and congresspersons are
continuously leisurewear than the expansion of ICTs, send
off our district susceptible to all categories
of cyberattacks and will brand it problematic to implement
cybercrime laws. Current proceedings demonstrate in the
province from Stuxnet to Saudi Aramco's attack that we are
nowadays fragment of comprehensive microelectronic
skirmishes. [16] .
Figure 2:Technical process of computer forensics [27].
5.1 Responsibility
As shown in Figure 2, the process of computer forensics
technology is divided into three phases [21]. First, In the Middle East, there is an enormous quandary when it
information for an interruption is developed. Then the comes to cyberspace commandments. When considering
composed information is conserved and investigated. Finally, cybercrime lawmaking enforceable in the region, there is no
219
Reem K. Alqurashi et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(1), January – February 2020, 217 – 224
management subdivision accountable for conscripting be a large challenge for commandment administration
commerce with Internet regulations. Many interventions by officials since they may contemplate campaigners to be cyber
the administration may be complicated in Internet-related criminals when commentary cybercrime. I recommend
rules and regulations, such as e-signature, e-commerce, declaring your administrative technique in any online
domain name registering, copyright and intellectual property, commandment particularly when commerce with digital
cybercrime, cyber espionage, and cyber terrorism. The suggestion. Commandment administration must be
engrossment of more than one management subdivision such accomplished in the modern performances for considering
as the Department of Business, the Department cybercrime [16] .
of Transportation and Info Knowledge, the Department of
Internal and Important Bank, the Department of 5.4 Education
Righteousness, and even the Astuteness and Resistance
Departments can be non-existent or in an experimental stage. One of the furthermost significant fundamentals in contesting
The problematic confronted by any of the overhead cybercrime is education and consciousness. Inappropriately,
establishments is to prerogative responsibility for such around is no operative approach or proposal to advance
commandments and this will be a challenge. For the Middle volume construction and safekeeping education in the area.
East managements when conscripting cybercrime There are insufficient concrete operations in Qatar, UAE,
commandment. It is significant to create an enthusiastic Oman and Saudi Arabia in the area of cybercrime education.
management subdivision to arrangement with Cybercrime lawmaking is not the individual resolution to
Internet commandments. [15] [16] . competition cybercrime. It is fragment of superior cyber
security approach which also necessitates better-quality
5.2 Organizational Structure instruction and consciousness movements. Administrations
must progress their volume construction and education of
One of the main challenges in the district is intersection, their workforce and inhabitants to better confrontation
specifically in production with cybercrime subjects. cybercrime[16] .
Cybercrime necessitates a momentous development of
administrative constructions to be in residence comprised of 5.5 Legislative Capabilities
strong relationships of orientation. It will be problematic to
comportment compound researches that necessitate the Legislation is fragment of the approach to contest cybercrime
backing of changed permissible and methodological and not the complete explanation. The badly-behaved is that
professionals. In the Middle East there are correspondingly when representative’s arrangement with cybercrime
struggles and nonexistence of association among many belongings, they will attempt to smear commonplace
performers to confrontation cybercrime. Commandment jurisdictional procedures that may embrace municipal,
implementation interventions are principally unassisted in criminal, and monitoring commandment. It capacity labor
contending cybercrime. Collaboration among dissimilar in an insufficient belonging but it will not labor in entirely
performers in cybercrime lawmaking must be lectured in belongings of cybercrime, specifically crimes constructed on
command to progress the administrative construction to the Internet. Electronic lawmaking or connected
struggle cybercrime [16]. commandments are feeble or absentminded in the region.
Smooth contemporary cybercrime commandments cannot be
5.3 Technical Capabilities painstaking complete and dependable to transaction with
cybercrime, expressly at the phase of examination, which is
There is a large predicament when it originates to one of the furthermost multifaceted stepladders. The
administrative procedures for cybercrime researches. There is following MENA countries in the region have cybercrime
correspondingly a badly-behaved in preserving the laws or a system to deal with cybercrime starting from the
truthfulness of digital indication throughout an examination year indicated [15]:
since it is continuously imperative in a criminal circumstance, UAE: Federal Law No.2 of 2006
but the countryside of the suggestion in cybercrime brands Saudi Arabia: Cybercrime System (2007)
this commission more problematic. Police brigadiers can Jordan: Cybercrime temporary law (2010)
effortlessly extinguish digital suggestion in cybercrime cases Syria: Cybercrime and Communication on the Internet
by means of constant procedures of uneasiness and (2012)
imprisonment. Commandment management brigadier’s Oman: Cybercrime Law (2011)
expression a foremost challenge beforehand attractive It is better for managements to learn from the Assembly of
respondents, who will requirement to divulge where and who Europe and attempt to sanction the Assembly of Europe's
the criminal is. Because cybercrime is a transcontinental Cybercrime Agreement. They organize not requirement to
crime, the probabilities of pursuing miserable respondents copy and paste, first they requirement to comprehend and
can be very problematic if not incredible. Shots to improved then smear the measures and drawn from the blow convention
pathway distinctiveness online pose thoughtful complications microelectronic commandments that encounter their
for concealment supporters and central to partisan responses
that are standard in the Middle East. I comprehend that it will
220
Reem K. Alqurashi et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(1), January – February 2020, 217 – 224
necessities and in agreement with the Universal Declaration to re-organize the internet provision in SA. Which led to the
of Humanoid Privileges[16]. spreading of tasks to numerous appropriate organizations to
advance service and promotion their effectiveness (Warf and
6. CASE STUDY: INTERNET USE AND Vincent, 2007).
CYBERSECURITY IN SAUDI ARABIA Complete, internet service is provided by [2] :
1. Infrastructures and Information Technology Department is
The Internet has a justly young history in 1997 in Saudi accountable for all the superintendent and supervisory roles
Arabia when Internet service became accessible to countries concerning the internet services.
in Saudi Arabia. It's an old-fashioned of possession? 2. Data Service Providers (DSP's), including Saudi Telecom
Conferring to an twelve-monthly report organized by the Company are accountable for the operative characteristics of
Communications and Information Technology Commission the network package filter (filtering).
(CITC) in Saudi Arabia in 2016, there was a noteworthy 3. King Abdul-Aziz City for Science and Technology
increase in Internet admittance in the country from 47% to (KACST) has continuous delivery of the link service to the
74.9% from 2011 to the end of 2016 respectively [34] [1]. internet for theoretical and research purposes and is
responsible for management interventions if needed,
4. Service breadwinners to the internet: Deliver the
connection to the Internet for administration subdivisions,
establishments, establishments, and persons. (King
Abdul-Aziz city for Science and Technology, 2014) [2].
221
Reem K. Alqurashi et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(1), January – February 2020, 217 – 224
information and drives to computers. The attack was meant to Use of the Internet and the transitional role-played by
stop oil production (World Exchange Report, 2013). maternities in the process. It principally relies on nonfiction
2- King Saud University (KSU) has been hacked by some on maternal inspirations on teenagers' use of the Internet.
unidentified hacker. It is a community university in Riyadh. Some literature scrutinizes the encouragement of parentages
3- The government administration in Saudi Arabia was on children's use of the Internet in Saudi Arabia. Overview of
hacked by a succession of heavy cyber-attacks, which teenagers' use of the Internet, the belongings on teenagers'
temporarily disrupted the government operations until attacks socialization and maternal inspirations on teenagers' use of
were stopped (Al-Arabiya, 2013) [17] . the Internet [2] .
6.3 Cyber laws of Saudi Arabia 6.5.1 Progenies and internet usage
Paper about Saudi Arabia Cyber commandment conditions In a report of the European Union Children's Online Survey,
mentioned that any individual who is complicated in it is recommended that 60% of children between the ages of 9
Construction, groundwork, communication, or storing of and 16 use the Internet daily, while 30% use the Internet at
substantial encroaching on community instruction, spiritual least weekly. However, the Internet has become a prevalent
standards, community moralities, and confidentiality, cybernetic location and location
concluded the data network or computers will be question to for many happenings. Zotova and Zinchenko (2014), the
incarceration for a historical not elsewhere five years and a Internet will become an encouragement in management the
well not beyond three million riyals or also [22] . relationship between people in society. Internet access does
not occur among the populace. Help us create new lines of
6.4 The Anti -Crime Act in Saudi Arabia announcement, but it is a social impression. You can connect
with children, youth, learning and network. Will have
Lawmaking is the backbone of each civilization. Laws, possessions on their social, psychological and physical health.
accompanied by ethical conscience, can lead to a less Until you use the Internet, you can be an operative elector in
non-violent world. It is a safe way to produce a civilization distribution ideas, as well as permitting students to physique
and make a country an appropriate place to live and connect specific communities. It is likely to build or accompaniment
with others. Therefore, it is very important that we have laws social capital and develop the aptitude of young people to cope
on cybercrime that represents a problem and a threat to social with threats or jeopardies. It is whispered to be a risk to
life because laws could act as a preventive measure to children. High digital capability leads to a digital culture This
committing these cybercrimes. And there is a singular cultural experience must be in need of ethical performance
circumstance in terms of authorizations approved in the and safety standards
Koran and Sunnah in Saudi Arabia. The Koran For example, you might be exposed to fighting between
and Sunnah did not mention laws and penalties imposed in nudity, disagreeable language and criminal ideas.
computer crimes, but the Koran and Sunnah mentioned
general penalties such as shoplifting, manslaughter, 6.5.2 Consequences of Internet Use for Children
disloyalty and other penalties, so the anti-crime law exists but
does not mention cybercrimes. The resulting damage The nonfiction says that there are many compensations to
regulates the level of each crime. using the Internet by children. However, the probable
Aimed at sample (stealing of bank accounts and stealing of negative impressions of the Internet on children make it
private photos or videos from the computer) decrease compulsory to guarantee that children are well endangered
underneath a low stealing but there are dissimilar properties from these effects. Reasonable Internet use. Bleakly et
for each, so there must be different consequences for each. al. (2016) reported that intellectual communication methods
In most countries in the region, children must be at least 18 have been used by many investigators to investigate the
years old to be deemed an adult, while in Saudi Arabia the harmful or challenging Internet use of people. The
15-member Shura Council proposes that children be less than challenging use of the Internet is accompanying with negative
15 years old. Internet services in Saudi Arabia also relational and psychosocial outcomes (Caplan and High,
run websites that spread pornography and tarnish Islamic 2011 in Mleakly et al., 2016). In children and young people,
values (www.internet.gov.sa) challenging Internet use is accompanying with increased
The crime of cyber terrorism falls under the influence rates of consideration deficit hyperactivity complaint (Yoo et
of corruption[23] . al., 2004), sleep sicknesses, afternoon overindulging (Choi et
al., 2009) and poor academic presentation
6.5 Internet Uses by Saudi Teenagers (Jacobsen and Forste, 2011). The negative impression of
problematic use of the Internet on children and young people
Some research into teenagers use of the Internet has focused makes the need to mediate the use of the Internet for risky
principally on its impression on character construction. children. The use of the Internet not only unfavorably affects
However, detailed research has absorbed on the role of fathers children's personal lives, but also in most cases these negative
in manipulating their teenagers' use of the Internet. For this effects can be protracted to comprise general connection and
determination, interactions with other people. Through social networking,
222
Reem K. Alqurashi et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(1), January – February 2020, 217 – 224
[13] I. Carr, Computer crime, Routledge, 2017. Information Management Journal (2019), pp.
[14] E. Casey, Digital evidence and computer crime: 1833358319847120.
Forensic science, computers, and the internet, https://doi.org/10.1177/1833358319847120
Academic press, 2011. [30] C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H.
[15] M. N. El Guindy and F. Hegazy, Cybercrime Spafford, A. Sundaram and D. Zamboni, Analysis of
Legislation in The Middle East, 2014. a denial of service attack on TCP, Proceedings. 1997
[16] M. Elguindy, Cybercrime Challenges in Middle IEEE Symposium on Security and Privacy (Cat. No.
East, 2012. 97CB36097), IEEE, 1997, pp. 208-223.
[17] B. M. E. Elnaim, Cyber crime in Kingdom of Saudi [31] G. K. Sodhi, G. S. Gaba, L. Kansal, E. Babulak, M.
Arabia: The threat today and the expected future, AlZain, S. K. Arora and M. Masud, Preserving
Information and Knowledge Management, 2013, pp. Authenticity and Integrity of Distributed Networks
14-19. through Novel Message Authentication Code,
[18] C. Gandhi, G. Suri, R. P. Golyan, P. Saxena and B. Indonesian Journal of Electrical Engineering and
K. Saxena, Packet sniffer–a comparative study, Computer Science, 12 (2018), pp. 1297-1304.
International Journal of Computer Networks and https://doi.org/10.11591/ijeecs.v12.i3.pp1297-1304
Communications Security, 2 (2014), pp. 179-187. [32] M. Vallentin, V. Paxson and R. Sommer, {VAST}:
[19] D. Gugelmann, F. Gasser, B. Ager and V. Lenders, A Unified Platform for Interactive Network
Hviz: HTTP (S) traffic aggregation and visualization Forensics, 13th {USENIX} Symposium on
for network forensics, Digital Investigation, 12 Networked Systems Design and Implementation
(2015), pp. S1-S11. ({NSDI} 16), 2016, pp. 345-362.
https://doi.org/10.1016/j.diin.2015.01.005 [33] O. Wori, Computer crimes: factors of cybercriminal
[20] A. B. Hassan, F. D. Lass and J. Makinde, activities, International Journal of Advanced
Cybercrime in Nigeria: causes, effects and the way Computer Science and Information Technology, 3
out, ARPN Journal of Science and Technology, 2 (2014), pp. 51-67.
(2012), pp. 626-631. [34] E. I. M. Zayid and N. A. A. Farah, A study on
[21] F. Karpisek, I. Baggili and F. Breitinger, WhatsApp cybercrime awareness test in Saudi Arabia-Alnamas
network forensics: Decrypting and understanding region, 2017 2nd International Conference on
the WhatsApp call signaling messages, Digital Anti-Cyber Crimes (ICACC), IEEE, 2017, pp.
Investigation, 15 (2015), pp. 110-118. 199-202.
[22] N. K. Khan, Cyber laws encompassing the Security https://doi.org/10.1109/Anti-Cybercrime.2017.7905
of E-Quran in Saudi Arabia. 290
[23] N. K. Khan, Taxonomy of Cyber Crimes and
Legislation in Saudi Arabia, International Journal of
Advanced Research in Computer Engineering &
Technology (IJARCET), 1 (2012), pp. 207.
[24] A. Maghaireh, Shariah Law and cyber-sectarian
conflict: how can Islamic Criminal Law respond to
cyber crime?, (2009).
[25] B. K. Mishra and A. Prajapati, Cyber Warfare:
Worms’ Transmission Model, International Journal
of Advanced Science and Technology, 63 (2014), pp.
83-94.
https://doi.org/10.14257/ijast.2014.63.08
[26] R. Moore, Cybercrime: Investigating
high-technology computer crime, Routledge, 2014.
[27] Y. Qi, Computer Real-Time Location Forensics
Method for Network Intrusion Crimes, IJ Network
Security, 21 (2019), pp. 530-535.
[28] S. B. Rathod and T. M. Pattewar, Content based
spam detection in email using Bayesian classifier,
2015 International Conference on Communications
and Signal Processing (ICCSP), IEEE, 2015, pp.
1257-1261.
[29] H. Samra, A. Li, B. Soh and M. Al Zain, Utilisation
of hospital information systems for medical research
in Saudi Arabia: A mixed-method exploration of the
views of healthcare and IT professionals involved in
hospital database management systems, Health
224