0% found this document useful (0 votes)
17 views

Ijatcse 33912020

This document discusses cybercrime challenges in Saudi Arabia. It begins by providing background on cybercrime, defining it as criminal activities involving illegal uses of computers. It describes how computers can be used as tools, storage devices, or victims in cybercrimes. The document then examines specific types of cybercrimes like spam, hacking, phishing, denial of service attacks, and virus dissemination. It explores the impact of internet use and cybercrime on adolescents in Saudi Arabia. Finally, it discusses Saudi Arabia's cybercrime laws and how Islamic criminal law addresses cybercrimes.

Uploaded by

rayan.alshami153
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Ijatcse 33912020

This document discusses cybercrime challenges in Saudi Arabia. It begins by providing background on cybercrime, defining it as criminal activities involving illegal uses of computers. It describes how computers can be used as tools, storage devices, or victims in cybercrimes. The document then examines specific types of cybercrimes like spam, hacking, phishing, denial of service attacks, and virus dissemination. It explores the impact of internet use and cybercrime on adolescents in Saudi Arabia. Finally, it discusses Saudi Arabia's cybercrime laws and how Islamic criminal law addresses cybercrimes.

Uploaded by

rayan.alshami153
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

ISSN 2278-3091

Volume 9, No.1, January – February 2020


Reem K. Alqurashi et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(1), January – February 2020, 217 – 224
International Journal of Advanced Trends in Computer Science and Engineering
Available Online at http://www.warse.org/IJATCSE/static/pdf/file/ijatcse33912020.pdf
https://doi.org/10.30534/ijatcse/2020/33912020

Cyber Attacks and Impacts: A Case Study in Saudi Arabia


Reem K. Alqurashi, Mohammed A. AlZain, Ben Soh*, Mehedi Masud, Jehad Al-Amri
College of Computers and Information Technology, Taif University, Saudi Arabia
*La Trobe University, Bundoora 3086, Australia.


ABSTRACT Relationships such as "cybercrime," "computer crime," and
"network crime" have no unanimously acknowledged
With the development of technology, modern definitions. Part of the misunderstanding arising from their
computer-assisted and Internet crimes have been increasing use originates from the circumstance that criminals now use
all this while, and there is a need to further investigate the computers in the progression of committing almost any
current status of cybercrime and computer forensics in the crime. Although there is no decided meaning of a computer
region. Saudi Arabia is one of the fastest growing countries in crime, the denotation of the tenure has developed more
the Middle East in terms of communications technologies detailed over time. A computer crime mentions principally to
such as the Internet and mobile phones. In this paper we a wide set of crimes defined in certain laws. These crimes
explore cybercrime challenges in the Middle East using Saudi comprise shoplifting of computer amenities; unsanctioned
Arabia as a case study. In particular, we examine the impact access to protected computers; software piracy and
of the use of Internet and cybercrime on adolescents in Saudi modification or stealing of warehoused information
Arabia. automatically; computer-assisted coercion; and obtaining
unauthorized access to records[3] [4] [31] [5] [29].
Keywords: crime, computer, Saudi Arabia, Forensics Circulation in pilfered passwords and broadcast of viruses or
Technology, interne, future, teenager destructive instructions also constitute a cybercrime. One of
the foremost complications in a computer crime is that when
1. INDTRODUCTION the computer or network is not directly implicated in a crime
but digital indication associated to the crime [14] .
With the development of technology, modern However, the roles played by a computer in a cybercrime can
computer-assisted and Internet crimes have been increasing be categorized in one of three ways: as a tool, as a storage
all this while. Cybercrime internationally affects the IT device, or as a victim [13].
environment to a large extent, be it management, companies,
banks or individuals[6] [9] [7]. The rapid expansion of the 2.1 Computer as a Tool
order of techniques has been observed. Information
sharing[11] [10] is a major distortion feature of The computer can be used as a tool to obligate movement
misappropriation of information on the Internet. crimes. This group embraces those crimes that criminals have
The remainder of this paper is organized as follows. Section II conventionally dedicated in the physical world but this is now
discusses the background of computer crimes. Section III lists fashionable with snowballing occurrence on the Internet,
some types of computer crimes, while Section IV explains the such as online mart deception, and pornography circulation.
forensic technology on the computer. In the V section we Criminals also use the Internet to encourage an extensive
discuss the challenges of cybercrime in the Middle East. In assortment of traditional crime environments that are not
the section VI speaks History of Internet use in Saudi Arabia. available in the “real world”, such as email and chat
In Section VII we explain computer crimes in Saudi Arabia meetings. Since criminals may use computer networks to
and in Section VIII some cases of attacks in Saudi Arabia and carry out traditional crimes in new conducts, steps must be
Section IX about cyber criminals in Saudi Arabia and in taken to assess prevailing criminal rules to guarantee that
Section X we explain anti-crime law in Saudi Arabia In what is forbidden in the physical world is correspondingly
section XI we discuss the use of adolescents for the Internet. proscribed in the computer-generated world.
In the XII section speaks of Islamic criminal law and also in
section XIII speaks that Sharia attends cybercrime and in 2.2 Computer as a Storage Device
section XIV talk about the future of cybercrime.
Criminals, such as industries, managements and persons,
2. BACKGROUND: WHAT IS CYBERCRIME? take benefit of the aptitude of computers to stockpile great
The term computer crime to refers to criminal activities quantities of information[8] [12]. Criminals stockpile
involving illegal uses of computers. The definition by information when obligating an extensive variability of
Eoghan Casey [26] is used in this paper. outdated crimes, and the electronic information develops
clues applicable to the internal working of the crime. The use

217
Reem K. Alqurashi et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(1), January – February 2020, 217 – 224

of computers and hardware stowage commonly does not 3.4 Phishing


necessitate the construction of new functional regulations, but
the need for electronic indication may necessitate a Phishing is an activity of endeavoring to obtain data for
modifications to current commandments overriding law example usernames, PINs, and credit card particulars (and
implementation access to such indication [13]. occasionally, money) by camouflaging as a dependable object
in an electronic announcement. Phishing through e-mail
2.3 Computer as a Victim deception or immediate messaging guides victims to access
a counterfeit website whose appearance and impression are
The computer can also be the board of criminal movement. practically indistinguishable to the authentic one [17].
Frequently described as “network crime,” this movement
3.5 Denial of service attack
comprises bouts on the security, integrity, or availability of
computer systems. Criminals transmit out these occurrences A network grounded renunciation of amenity attack for IP
to: (1) acquire information warehoused on the victim's (Internet Protocol) constructed networks. It is prevalently
computer without authorization, (2) remove or adapt data or called SYN submerging. It the whole thing by an attacker
restrict data access with the convenience of a computer or the distribution many TCP (Transmission Control Protocol)
joining requirements with tricked foundation discourses to a
information it comprises. Criminal activities encompassed in
victim's machine. Each demand reasons the beleaguered host
this grouping of computer as a victim are unauthorized access to instantiate data constructions out of an incomplete puddle
to a computer[29], the announcement of viruses and other of possessions. Once the board congregation's resources are
malevolent code, distortion of websites, and renunciation of bushed, no more received TCP influences can be recognized
service attacks that cause inconvenience and/or damages to [30].
computer systems or data [13].
3.6 Virus Dissemination
3. TYPES OF COMPUTER CRIMES
A computer virus is a sequencer that container ‘infect’ other
3.1 Spam genuine agendas by adjusting them to comprise a conceivably
‘evolved’ reproduction of himself. Viruses can banquet
E-mail messages are an essential contribution. Often, themselves, deprived of the information or authorization of
hacking, design attacks, and malicious attacks on e-mail the workers, to hypothetically The Internet stretches viruses a
services are attempted to defraud. Attackers use emails that predominantly well-organized new pathway for
may have original content with phishing URLs to steal useful comprehensive contamination. The following figure show
data. This kind of email is just spam [28]. relatives and environments of viruses [17].

3.2 Worms

Computer worms are constructed to broadcast without


warning or user interaction, producing an upsurge in traffic
service requests that will ultimately lead to cyber-attack.
Attacker uses a malevolent worm as a primary tool to target
software susceptibilities [25].

3.3 Sniffer

Packet sniffing is the restriction of packets that pass through


the network in which they are installed. Sniffer Pack is a tool Figure 1 : Viruses – Families and Habitats [17].
that monitors all network data, which is easy to use.
Packet sniffers are mostly used by network administrators to 3.7 Cyber Stalking
help them troubleshoot network problems.
Sniffers are of two types: active and passive. The passive Cyber stalking is fundamentally by means of the Internet to
sniffers only collect data and are impossible to detect. Passive frequently pursue alternative individual. This exasperation
sniffers are useful for network management in areas such as could be voluptuous in landscape, or it could have
telecommunications, radar systems, medical equipment, etc. supplementary enthusiasms counting annoyance. Individuals
Active sniffers operate on other systems through different dispensation a lot of info around themselves online. Such info
technologies. For example, a malicious packet can be sent can permission one defenseless to cyber pestering, a period
from a compromised host to a legitimate host [18]. that fundamentally mentions to by means of the Internet to

218
Reem K. Alqurashi et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(1), January – February 2020, 217 – 224

stem (to illegitimately shadow and wristwatch somebody) the evidence and information obtained from the investigation
[20]. are recorded immediately as a statement. In the three
progressions of indication assortment, based on the
3.8 Password Attacks continuousness attitude of e ective indication, it is
compulsory to greatest the three progressions [27].
The goal of a password attack is to also deduction a password Network interruption information, network interruption is
or become it finished trust dodges, which are recognized as typically an occurrence on a server with a huge quantity of
social engineering. And password attacks consume humble compost information, and the authentic determination of the
adventures. Most password attacks are envisioned for process is concealed in it for an incursion determination. The
contravention. However, admission container likewise communal network occurrence manner is a flood occurrence
principal to stealing and destruction. The outbreak must be that is merely uneven and di cult to preserve. The communal
cautiously deliberate and implemented. A password attack flood occurrence methods are User Datagram Protocol (UDP)
container continuously be confidential as a prearranged flood attack, Transmission Control Protocol (TCP) flood
category of mistreatment, and the universal physiognomies attack and Internet Control Messages Protocol (ICMP) flood
accompanying with this organization smear. Assumed the attack [27] .
dependence on social engineering, which is operating persons The overhead flood occurrences are all DDoS flood
in instruction to two-time them from penetrating information occurrences, which flood the server with a huge quantity of
such as passwords, the greatest credible method to attack is compost information, instigating the server to run out of
concluded individual communication. Social engineering capitals and go downhearted. The di erence amongst the
category of password attacks contributes to up to 90 % of all three DDoS flooding occurrences declared overhead
such attacks. The individual who is prospective to obligate a dishonesties in the di erent message information used for the
password attack is the individual situated neighboring the occurrence. UDP message mostly occurrences target IP
residence where the attack instigated, as an interior address. TCP mostly uses the TCP protocol to overhang a
foundation or user [33]. service. Information for demanding confirmation is
uninterruptedly sent to devour server resource. And
4. COMPUTER FORENSICS TECHNOLOGY admittance to other users is blocked. ICMP is a tra c
occurrence that devours resources by sending more than
With the speedy expansion of network technology, people's 65,535 bytes of information to the server[27].
existence has transformed melodramatically. The beginning In order to see the effectiveness of computer forensics, the
of the Internet does not deliver coziness. It also delivers a new subsequent three philosophies should be adhered to [19]:
criminal frequency that fluctuates from the outmoded 1) The crime scene is cordoned to guarantee the indication
frequency. In bright of the new network crime, computer (evidence) is not contaminated.;
forensics technology ascends at the ancient instant. Computer 2) The assortment of indication network truthfulness and
forensics is also called a criminological network study. The continuousness necessity be certain. The final indication
indication of the network crime it delivers is documented by succumbed will be the same as the final indication examined.
commandment and can be secondhand as an operative and 3) In the complete progression of suggestion assortment, there
dependable basis of sentence. The main attitude in computer requirement be a third party to administer so to safeguard the
forensics [32] is to use the appropriate network information independence of indication [27].
investigation technology to magistrate the motivation of the
crime and to accumulate the network crime data of the 5. CYBERCRIME CHALLENGES IN THE MIDDLE
suspicious specifically, which is engaged as the indication of EAST
authorized experimental [27] .
Progressive communications technologies exposed the
entrance to the development of humankind and crime. But
lawmaking and congresspersons are
continuously leisurewear than the expansion of ICTs, send
off our district susceptible to all categories
of cyberattacks and will brand it problematic to implement
cybercrime laws. Current proceedings demonstrate in the
province from Stuxnet to Saudi Aramco's attack that we are
nowadays fragment of comprehensive microelectronic
skirmishes. [16] .
Figure 2:Technical process of computer forensics [27].
5.1 Responsibility
As shown in Figure 2, the process of computer forensics
technology is divided into three phases [21]. First, In the Middle East, there is an enormous quandary when it
information for an interruption is developed. Then the comes to cyberspace commandments. When considering
composed information is conserved and investigated. Finally, cybercrime lawmaking enforceable in the region, there is no
219
Reem K. Alqurashi et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(1), January – February 2020, 217 – 224

management subdivision accountable for conscripting be a large challenge for commandment administration
commerce with Internet regulations. Many interventions by officials since they may contemplate campaigners to be cyber
the administration may be complicated in Internet-related criminals when commentary cybercrime. I recommend
rules and regulations, such as e-signature, e-commerce, declaring your administrative technique in any online
domain name registering, copyright and intellectual property, commandment particularly when commerce with digital
cybercrime, cyber espionage, and cyber terrorism. The suggestion. Commandment administration must be
engrossment of more than one management subdivision such accomplished in the modern performances for considering
as the Department of Business, the Department cybercrime [16] .
of Transportation and Info Knowledge, the Department of
Internal and Important Bank, the Department of 5.4 Education
Righteousness, and even the Astuteness and Resistance
Departments can be non-existent or in an experimental stage. One of the furthermost significant fundamentals in contesting
The problematic confronted by any of the overhead cybercrime is education and consciousness. Inappropriately,
establishments is to prerogative responsibility for such around is no operative approach or proposal to advance
commandments and this will be a challenge. For the Middle volume construction and safekeeping education in the area.
East managements when conscripting cybercrime There are insufficient concrete operations in Qatar, UAE,
commandment. It is significant to create an enthusiastic Oman and Saudi Arabia in the area of cybercrime education.
management subdivision to arrangement with Cybercrime lawmaking is not the individual resolution to
Internet commandments. [15] [16] . competition cybercrime. It is fragment of superior cyber
security approach which also necessitates better-quality
5.2 Organizational Structure instruction and consciousness movements. Administrations
must progress their volume construction and education of
One of the main challenges in the district is intersection, their workforce and inhabitants to better confrontation
specifically in production with cybercrime subjects. cybercrime[16] .
Cybercrime necessitates a momentous development of
administrative constructions to be in residence comprised of 5.5 Legislative Capabilities
strong relationships of orientation. It will be problematic to
comportment compound researches that necessitate the Legislation is fragment of the approach to contest cybercrime
backing of changed permissible and methodological and not the complete explanation. The badly-behaved is that
professionals. In the Middle East there are correspondingly when representative’s arrangement with cybercrime
struggles and nonexistence of association among many belongings, they will attempt to smear commonplace
performers to confrontation cybercrime. Commandment jurisdictional procedures that may embrace municipal,
implementation interventions are principally unassisted in criminal, and monitoring commandment. It capacity labor
contending cybercrime. Collaboration among dissimilar in an insufficient belonging but it will not labor in entirely
performers in cybercrime lawmaking must be lectured in belongings of cybercrime, specifically crimes constructed on
command to progress the administrative construction to the Internet. Electronic lawmaking or connected
struggle cybercrime [16]. commandments are feeble or absentminded in the region.
Smooth contemporary cybercrime commandments cannot be
5.3 Technical Capabilities painstaking complete and dependable to transaction with
cybercrime, expressly at the phase of examination, which is
There is a large predicament when it originates to one of the furthermost multifaceted stepladders. The
administrative procedures for cybercrime researches. There is following MENA countries in the region have cybercrime
correspondingly a badly-behaved in preserving the laws or a system to deal with cybercrime starting from the
truthfulness of digital indication throughout an examination year indicated [15]:
since it is continuously imperative in a criminal circumstance, UAE: Federal Law No.2 of 2006
but the countryside of the suggestion in cybercrime brands Saudi Arabia: Cybercrime System (2007)
this commission more problematic. Police brigadiers can Jordan: Cybercrime temporary law (2010)
effortlessly extinguish digital suggestion in cybercrime cases Syria: Cybercrime and Communication on the Internet
by means of constant procedures of uneasiness and (2012)
imprisonment. Commandment management brigadier’s Oman: Cybercrime Law (2011)
expression a foremost challenge beforehand attractive It is better for managements to learn from the Assembly of
respondents, who will requirement to divulge where and who Europe and attempt to sanction the Assembly of Europe's
the criminal is. Because cybercrime is a transcontinental Cybercrime Agreement. They organize not requirement to
crime, the probabilities of pursuing miserable respondents copy and paste, first they requirement to comprehend and
can be very problematic if not incredible. Shots to improved then smear the measures and drawn from the blow convention
pathway distinctiveness online pose thoughtful complications microelectronic commandments that encounter their
for concealment supporters and central to partisan responses
that are standard in the Middle East. I comprehend that it will
220
Reem K. Alqurashi et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(1), January – February 2020, 217 – 224

necessities and in agreement with the Universal Declaration to re-organize the internet provision in SA. Which led to the
of Humanoid Privileges[16]. spreading of tasks to numerous appropriate organizations to
advance service and promotion their effectiveness (Warf and
6. CASE STUDY: INTERNET USE AND Vincent, 2007).
CYBERSECURITY IN SAUDI ARABIA Complete, internet service is provided by [2] :
1. Infrastructures and Information Technology Department is
The Internet has a justly young history in 1997 in Saudi accountable for all the superintendent and supervisory roles
Arabia when Internet service became accessible to countries concerning the internet services.
in Saudi Arabia. It's an old-fashioned of possession? 2. Data Service Providers (DSP's), including Saudi Telecom
Conferring to an twelve-monthly report organized by the Company are accountable for the operative characteristics of
Communications and Information Technology Commission the network package filter (filtering).
(CITC) in Saudi Arabia in 2016, there was a noteworthy 3. King Abdul-Aziz City for Science and Technology
increase in Internet admittance in the country from 47% to (KACST) has continuous delivery of the link service to the
74.9% from 2011 to the end of 2016 respectively [34] [1]. internet for theoretical and research purposes and is
responsible for management interventions if needed,
4. Service breadwinners to the internet: Deliver the
connection to the Internet for administration subdivisions,
establishments, establishments, and persons. (King
Abdul-Aziz city for Science and Technology, 2014) [2].

6.1 Computer crimes in Saudi Arabia

Information technology in the Arab world has been a great


impact in the last century, with 15.8 million internet users in
Saudi Arabia at the end of 2012. Field surveys in Saudi
Arabia carries out by the Communications and Information
Technology Commission estimated more than one user per
Figure 3: The increasing use of the internet in Saudi Arabia. mobile broadband subscription. Demand for Internet services
is expected to increase by more than SAR 2.6 billion in 2012,
The country’s populace is projected at 3 million, and the approximately SAR 3.6 billion in 2012. They experienced
projected number of internet users predictable at 24 million financial losses in Saudi Arabia in 2012 and suffered
people, demonstrations that at least 75% of the total populace financial losses of $195 (approximately SAR 730). It is rated
has internet admittance. The CITC report of 2016 also on 40% of the study in Saudi Arabia. That's their computer
designates that due to the development of the use of internet [17]. Almost all Middle Eastern countries have electronic
podiums and submissions such as social media and laws. It requires an appropriate law to deal with cybercrime
internet-based games, the request for broadband and internet that complies with Islamic law, commensurate with the large
services has intensely increased [34] [1]. number of Muslims in the Arab world. In general, computer
Internet and ICT use in the country is accompanying to crimes started from piracy programs.
services and is anticipated to intensification even more than
we have seen in current years. As such, information security Government transactions in Saudi Arabia involve almost all
will become an indispensable requirement for 75% of the total computers, whether in circulation regulator,
populace of Saudi Arabia who frequently admittance the communications, power, fitness info system or passport. Any
Internet. Saudi Arabia's digital transformation blueprint lists compromise on the security of the management system can do
information security and cybersecurity as some mechanisms great damage. Cybercrime is fragment of or complicated in
that will be an integral fragment of the expansion of the use of “conventional crimes” such as medication transferring,
Internet-based services in the country. The approach comes at individuals running and money cleaning. What threatens
a time when Saudi Arabia is seeing an increasing number of young Saudis is that they are genuinely complicated in such
establishments, which seek answers to information crimes, but also commonly do not vacillate to use the Internet
security execution [1]. to obligate dissimilar kinds of crimes, from replication
This, in calculation to the snowballing volume for information to promoting drugs and pornography [23].
intercontinental internet connectivity, generates a noteworthy 6.2 Cases of cyber-attacks in Saudi Arabia
question that is transported about by
the stable intensification in the mandate for internet use Three examples of recent cyber-attacks in Saudi Arabia are
within KSA [1]. given below:
Since the commencement of 2005, the Internet service in 1- State oil company Aramco came under cyberattack. More
Saudi kingdom saying the principal and most important than 30,000 computers in Saudi oil company Aramco was hit
process of rearrangement where the Convention of Preachers by a virus in August 2012 and resulted in the demolition of
Steadfastness issued rule number 229 on 28/09/2004 in order

221
Reem K. Alqurashi et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(1), January – February 2020, 217 – 224

information and drives to computers. The attack was meant to Use of the Internet and the transitional role-played by
stop oil production (World Exchange Report, 2013). maternities in the process. It principally relies on nonfiction
2- King Saud University (KSU) has been hacked by some on maternal inspirations on teenagers' use of the Internet.
unidentified hacker. It is a community university in Riyadh. Some literature scrutinizes the encouragement of parentages
3- The government administration in Saudi Arabia was on children's use of the Internet in Saudi Arabia. Overview of
hacked by a succession of heavy cyber-attacks, which teenagers' use of the Internet, the belongings on teenagers'
temporarily disrupted the government operations until attacks socialization and maternal inspirations on teenagers' use of
were stopped (Al-Arabiya, 2013) [17] . the Internet [2] .

6.3 Cyber laws of Saudi Arabia 6.5.1 Progenies and internet usage

Paper about Saudi Arabia Cyber commandment conditions In a report of the European Union Children's Online Survey,
mentioned that any individual who is complicated in it is recommended that 60% of children between the ages of 9
Construction, groundwork, communication, or storing of and 16 use the Internet daily, while 30% use the Internet at
substantial encroaching on community instruction, spiritual least weekly. However, the Internet has become a prevalent
standards, community moralities, and confidentiality, cybernetic location and location
concluded the data network or computers will be question to for many happenings. Zotova and Zinchenko (2014), the
incarceration for a historical not elsewhere five years and a Internet will become an encouragement in management the
well not beyond three million riyals or also [22] . relationship between people in society. Internet access does
not occur among the populace. Help us create new lines of
6.4 The Anti -Crime Act in Saudi Arabia announcement, but it is a social impression. You can connect
with children, youth, learning and network. Will have
Lawmaking is the backbone of each civilization. Laws, possessions on their social, psychological and physical health.
accompanied by ethical conscience, can lead to a less Until you use the Internet, you can be an operative elector in
non-violent world. It is a safe way to produce a civilization distribution ideas, as well as permitting students to physique
and make a country an appropriate place to live and connect specific communities. It is likely to build or accompaniment
with others. Therefore, it is very important that we have laws social capital and develop the aptitude of young people to cope
on cybercrime that represents a problem and a threat to social with threats or jeopardies. It is whispered to be a risk to
life because laws could act as a preventive measure to children. High digital capability leads to a digital culture This
committing these cybercrimes. And there is a singular cultural experience must be in need of ethical performance
circumstance in terms of authorizations approved in the and safety standards
Koran and Sunnah in Saudi Arabia. The Koran For example, you might be exposed to fighting between
and Sunnah did not mention laws and penalties imposed in nudity, disagreeable language and criminal ideas.
computer crimes, but the Koran and Sunnah mentioned
general penalties such as shoplifting, manslaughter, 6.5.2 Consequences of Internet Use for Children
disloyalty and other penalties, so the anti-crime law exists but
does not mention cybercrimes. The resulting damage The nonfiction says that there are many compensations to
regulates the level of each crime. using the Internet by children. However, the probable
Aimed at sample (stealing of bank accounts and stealing of negative impressions of the Internet on children make it
private photos or videos from the computer) decrease compulsory to guarantee that children are well endangered
underneath a low stealing but there are dissimilar properties from these effects. Reasonable Internet use. Bleakly et
for each, so there must be different consequences for each. al. (2016) reported that intellectual communication methods
In most countries in the region, children must be at least 18 have been used by many investigators to investigate the
years old to be deemed an adult, while in Saudi Arabia the harmful or challenging Internet use of people. The
15-member Shura Council proposes that children be less than challenging use of the Internet is accompanying with negative
15 years old. Internet services in Saudi Arabia also relational and psychosocial outcomes (Caplan and High,
run websites that spread pornography and tarnish Islamic 2011 in Mleakly et al., 2016). In children and young people,
values (www.internet.gov.sa) challenging Internet use is accompanying with increased
The crime of cyber terrorism falls under the influence rates of consideration deficit hyperactivity complaint (Yoo et
of corruption[23] . al., 2004), sleep sicknesses, afternoon overindulging (Choi et
al., 2009) and poor academic presentation
6.5 Internet Uses by Saudi Teenagers (Jacobsen and Forste, 2011). The negative impression of
problematic use of the Internet on children and young people
Some research into teenagers use of the Internet has focused makes the need to mediate the use of the Internet for risky
principally on its impression on character construction. children. The use of the Internet not only unfavorably affects
However, detailed research has absorbed on the role of fathers children's personal lives, but also in most cases these negative
in manipulating their teenagers' use of the Internet. For this effects can be protracted to comprise general connection and
determination, interactions with other people. Through social networking,
222
Reem K. Alqurashi et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(1), January – February 2020, 217 – 224

young people create new associations and reinforce REFERENCES


existing ones [2] .
[1] H. Agil, COPYRIGHT AND INTERNET LAWS IN
6.6 Islamic Criminal Code SAUDI ARABIA" THE NEED OF
IMPROVEMENT.
Muslim ministers belittle nonspiritual permissible systems [2] A. Almogbel, Parental Influences on the Internet
that are functional in numerous Muslim republics, for Use by Children in Saudi Arabia, (2019).
example in Jordan, they have not fashioned an another [3] M. A. AlZain, Data security, data management and
standpoint but unclear and universal philosophies. Dissimilar performance evaluation in a multi-cloud computing
categories of crimes, counting cybercrime, remained model, (2014).
disregarded. This, of progression, creates a possible danger to [4] M. A. AlZain, A. S. Li, B. Soh and M. Masud,
cyberspace, since the islamic law (Shariah’s) attitude of Byzantine Fault-Tolerant Architecture in Cloud
criminalization conditions. It is mentioned in quran ‘And nor Data Management, International Journal of
will we punishing pending we had directed them an Apostle’ Knowledge Society Research (IJKSR), 7 (2016), pp.
(Qur’an 17:15). It is unspoken that the crimes and 86-98.
chastisements must not be functional retroactively. If no https://doi.org/10.4018/IJKSR.2016070106
rejoinder in Shariah, then cyber criminals and Muslim [5] M. A. AlZain, A. S. Li, B. Soh and M. Masud,
hackers who dedicated cybercrime can seepage persuasion Managing Multi-Cloud Data Dependability Faults,
[24] . Knowledge-Intensive Economies and Opportunities
for Social, Organizational, and Technological
6.7 Shariah prohibits Cyber crime Growth, IGI Global, 2019, pp. 207-221.
[6] M. A. Alzain and E. Pardede, Using multi shares for
Shariah does not clearly proscribe any sympathetic of ensuring privacy in database-as-a-service, 2011 44th
cybercrime, then it prepares cover universal instructions of Hawaii International Conference on System
criminalization. Rendering to the fundamentalists, the Sciences, IEEE, 2011, pp. 1-9.
additional foundation of Shariah regulation, (the Prophet https://doi.org/10.1109/HICSS.2011.478
Tradition) delivers important provision for the [7] M. A. AlZain, E. Pardede, B. Soh and J. A. Thom,
criminalization of cybercrime. Researchers have mentioned a Cloud computing security: from single to
number of Hadiths, aimed at sample, the Prophet said ‘No multi-clouds, 2012 45th Hawaii International
damage will be perpetrated [on anyone] nor communal [in Conference on System Sciences, IEEE, 2012, pp.
contradiction of anyone]’ to criminalise developing crimes. 5490-5499.
The Hadith delivers a permissible foundation for [8] M. A. AlZain, B. Soh and E. Pardede, A byzantine
criminalizing cybercrime [24]. fault tolerance model for a multi-cloud computing,
2013 IEEE 16Th International Conference On
7. THE FUTURE OF CYBERCRIME Computational Science And Engineering, IEEE,
2013, pp. 130-137.
Cybercrime has an unpredictable future judging from the [9] M. A. AlZain, B. Soh and E. Pardede, Mcdb: using
trends where the culprits always end up a step ahead of the multi-clouds to ensure security in cloud computing,
authorities. Cyber criminals always come up with a new way 2011 IEEE Ninth International Conference on
of committing the crimes. Authorities have to increase the Dependable, Autonomic and Secure Computing,
skill levels if they hope to catch up with cybercrime offenders. IEEE, 2011, pp. 784-791.
Cyber criminals seem always to find a new way of defrauding https://doi.org/10.1109/DASC.2011.133
people. [10] M. A. AlZain, B. Soh and E. Pardede, A new
Growth of cybercrimes shows that there is a high chance that approach using redundancy technique to improve
it would continue growing. Currently, traditional laws and security in cloud computing, Proceedings Title: 2012
technical protection are no longer enough against computer International Conference on Cyber Security, Cyber
crimes. Warfare and Digital Forensic (CyberSec), IEEE,
2012, pp. 230-235.
8. CONCLUSION [11] M. A. AlZain, B. Soh and E. Pardede, A new model
to ensure security in cloud computing services,
With the development of technology, modern Journal of Service Science Research, 4 (2012), pp.
computer-assisted and Internet crimes have been increasing 49-70.
all this while, and there is a need to further investigate the [12] M. A. AlZain, B. Soh and E. Pardede, A survey on
current status of cybercrime and computer forensics in the data security issues in cloud computing: From single
Middle East, particularly Saudi Arabia. In this paper we to multi-clouds, Journal of Software, 8 (2013), pp.
explored cybercrime challenges in Saudi Arabia. In 1068-1078.
particular, we examine the impact of the use of Internet and https://doi.org/10.4304/jsw.8.5.1068-1078
cybercrime on adolescents in Saudi Arabia.
223
Reem K. Alqurashi et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(1), January – February 2020, 217 – 224

[13] I. Carr, Computer crime, Routledge, 2017. Information Management Journal (2019), pp.
[14] E. Casey, Digital evidence and computer crime: 1833358319847120.
Forensic science, computers, and the internet, https://doi.org/10.1177/1833358319847120
Academic press, 2011. [30] C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H.
[15] M. N. El Guindy and F. Hegazy, Cybercrime Spafford, A. Sundaram and D. Zamboni, Analysis of
Legislation in The Middle East, 2014. a denial of service attack on TCP, Proceedings. 1997
[16] M. Elguindy, Cybercrime Challenges in Middle IEEE Symposium on Security and Privacy (Cat. No.
East, 2012. 97CB36097), IEEE, 1997, pp. 208-223.
[17] B. M. E. Elnaim, Cyber crime in Kingdom of Saudi [31] G. K. Sodhi, G. S. Gaba, L. Kansal, E. Babulak, M.
Arabia: The threat today and the expected future, AlZain, S. K. Arora and M. Masud, Preserving
Information and Knowledge Management, 2013, pp. Authenticity and Integrity of Distributed Networks
14-19. through Novel Message Authentication Code,
[18] C. Gandhi, G. Suri, R. P. Golyan, P. Saxena and B. Indonesian Journal of Electrical Engineering and
K. Saxena, Packet sniffer–a comparative study, Computer Science, 12 (2018), pp. 1297-1304.
International Journal of Computer Networks and https://doi.org/10.11591/ijeecs.v12.i3.pp1297-1304
Communications Security, 2 (2014), pp. 179-187. [32] M. Vallentin, V. Paxson and R. Sommer, {VAST}:
[19] D. Gugelmann, F. Gasser, B. Ager and V. Lenders, A Unified Platform for Interactive Network
Hviz: HTTP (S) traffic aggregation and visualization Forensics, 13th {USENIX} Symposium on
for network forensics, Digital Investigation, 12 Networked Systems Design and Implementation
(2015), pp. S1-S11. ({NSDI} 16), 2016, pp. 345-362.
https://doi.org/10.1016/j.diin.2015.01.005 [33] O. Wori, Computer crimes: factors of cybercriminal
[20] A. B. Hassan, F. D. Lass and J. Makinde, activities, International Journal of Advanced
Cybercrime in Nigeria: causes, effects and the way Computer Science and Information Technology, 3
out, ARPN Journal of Science and Technology, 2 (2014), pp. 51-67.
(2012), pp. 626-631. [34] E. I. M. Zayid and N. A. A. Farah, A study on
[21] F. Karpisek, I. Baggili and F. Breitinger, WhatsApp cybercrime awareness test in Saudi Arabia-Alnamas
network forensics: Decrypting and understanding region, 2017 2nd International Conference on
the WhatsApp call signaling messages, Digital Anti-Cyber Crimes (ICACC), IEEE, 2017, pp.
Investigation, 15 (2015), pp. 110-118. 199-202.
[22] N. K. Khan, Cyber laws encompassing the Security https://doi.org/10.1109/Anti-Cybercrime.2017.7905
of E-Quran in Saudi Arabia. 290
[23] N. K. Khan, Taxonomy of Cyber Crimes and
Legislation in Saudi Arabia, International Journal of
Advanced Research in Computer Engineering &
Technology (IJARCET), 1 (2012), pp. 207.
[24] A. Maghaireh, Shariah Law and cyber-sectarian
conflict: how can Islamic Criminal Law respond to
cyber crime?, (2009).
[25] B. K. Mishra and A. Prajapati, Cyber Warfare:
Worms’ Transmission Model, International Journal
of Advanced Science and Technology, 63 (2014), pp.
83-94.
https://doi.org/10.14257/ijast.2014.63.08
[26] R. Moore, Cybercrime: Investigating
high-technology computer crime, Routledge, 2014.
[27] Y. Qi, Computer Real-Time Location Forensics
Method for Network Intrusion Crimes, IJ Network
Security, 21 (2019), pp. 530-535.
[28] S. B. Rathod and T. M. Pattewar, Content based
spam detection in email using Bayesian classifier,
2015 International Conference on Communications
and Signal Processing (ICCSP), IEEE, 2015, pp.
1257-1261.
[29] H. Samra, A. Li, B. Soh and M. Al Zain, Utilisation
of hospital information systems for medical research
in Saudi Arabia: A mixed-method exploration of the
views of healthcare and IT professionals involved in
hospital database management systems, Health
224

You might also like