Reference Hub8
Critical Cybersecurity Threats: Frontline Issues Faced by Bahraini Organizations

Critical Cybersecurity Threats: Frontline Issues Faced by Bahraini Organizations

Adel Ismail Al-Alawi, Sara Abdulrahman Al-Bassam, Arpita A. Mehrotra
ISBN13: 9781799824183|ISBN10: 1799824187|ISBN13 Softcover: 9781799824190|EISBN13: 9781799824206
DOI: 10.4018/978-1-7998-2418-3.ch011
Cite Chapter Cite Chapter

MLA

Al-Alawi, Adel Ismail, et al. "Critical Cybersecurity Threats: Frontline Issues Faced by Bahraini Organizations." Implementing Computational Intelligence Techniques for Security Systems Design, edited by Yousif Abdullatif Albastaki and Wasan Awad, IGI Global, 2020, pp. 210-229. https://doi.org/10.4018/978-1-7998-2418-3.ch011

APA

Al-Alawi, A. I., Al-Bassam, S. A., & Mehrotra, A. A. (2020). Critical Cybersecurity Threats: Frontline Issues Faced by Bahraini Organizations. In Y. Albastaki & W. Awad (Eds.), Implementing Computational Intelligence Techniques for Security Systems Design (pp. 210-229). IGI Global. https://doi.org/10.4018/978-1-7998-2418-3.ch011

Chicago

Al-Alawi, Adel Ismail, Sara Abdulrahman Al-Bassam, and Arpita A. Mehrotra. "Critical Cybersecurity Threats: Frontline Issues Faced by Bahraini Organizations." In Implementing Computational Intelligence Techniques for Security Systems Design, edited by Yousif Abdullatif Albastaki and Wasan Awad, 210-229. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2418-3.ch011

Export Reference

Mendeley
Favorite

Abstract

One common reason for cybercrime is the goal of damaging a business by hacking or destroying important information. Another such reason is the criminal's goal of gaining financially from the hack. This chapter analyzes Bahraini organizations' vulnerability to digital security threats. It has used qualitative research to analyze industry performance. Moreover, with the support of secondary research, it has also explored cybersecurity threats faced by such organizations. The discussion based on secondary data analysis has explored two major aspects of Bahraini organizations and the cybersecurity threats they face. Firstly, the data and finances of both sectors are at huge risk in Bahraini organizations. Secondly, one important aspect of exploration has been to identify the most frequently encountered forms of cybercrime. Its analysis reveals that the kind of cybersecurity threat that a business is most likely to face is cyberwarfare. This may affect two rival businesses while they are competing with each other. Competitors' data may be destroyed or hacked—leading to long-term losses.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.