NEWS
UOB Employees Learn About Electronic Risks and How to Deal with Them
UOB Employees Learn About Electronic Risks and How to Deal with Them
The employees of the University of Bahrain (UOB) learned about the most significant electronic risks and how to deal with them during a workshop entitled “Technical Information Security”, which was organized by the Information Technology Center at UOB on Wednesday (19 February 2020) at the campus of Sakhir, in cooperation with the Administrative Training Office at the University and the Information and E-Government Authority.
The workshop was held for two consecutive days and in which about 120 administrators participated and discussed issues such as information security, types of electronic risks and how to deal with them, in addition to laws and regulations related to information security in the government sector.
Computer security official at the Information and E-Government Authority, Yousif Khaled Al-Maloud, stated: “Today, cyber-attacks have become more dangerous than ever and have introduced a new kind of wars known as electronic (cyber) wars, which may not require many weapons, but their destructive effects are enormous.”
Also, he pointed out that hacking attempts can be caused by various motives such as blackmail, political goals, or destructive motives, which threat level can be determined by the type of hacking and the number of attempts, stressing that the awareness of employees would lead to the failure of 90% of electronic hacking attempts.
Moreover, Al-Maloud indicated that “the Information and E-Government Authority gives utmost importance to spreading awareness on the dangers of electronic threats and their preventions” noting that “the Authority has undertaken several initiatives to raise awareness of information security, one of which is “Trust “program, which has benefited more than four thousand government employees since its launch in 2016.”
Furthermore, Al-Maloud pointed out that information security is determined through setting policies and procedures, creating modern technologies, and raising awareness of the importance and methods of dealing with electronic threats, noting the elements of information security include confidentiality, integrity, and availability that is done through backup.
During his speech, the computer security administrator discussed types of risks, such as viruses, electronic worms, hacking methods by backdoors, trojans, spyware, adware, keyboard viruses, and hacking through the information available on social media.
Also, he talked about important measures to protect information security, and concluded his speech by reviewing regulations related to information technology crimes, such as illegal entry, data destruction, data interception, threats and extortion, forgery, and fraud, in addition to noting crimes related to the protection of the State’s information and documents.