Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Bushra Elamin
  • Saudi Arabia

Bushra Elamin

Cryptography has been practiced to conceal messages science antiquity by different civilizations, including the ancient Egyptian, Chinese, Indian, Mesopotamian, Greek and Roman. But in none of them was there any cryptanalysis, only... more
Cryptography has been practiced to conceal messages science antiquity by different civilizations, including the ancient Egyptian, Chinese, Indian, Mesopotamian, Greek and Roman. But in none of them was there any cryptanalysis, only cryptography existed. Cryptology, the science of both making ciphers (cryptography) and breaking them (cryptanalysis), was born among the Arabs shortly after the rise of the Arab-Islamic empire. Many Arab scholars wrote on, and excelled in practicing, both branches of cryptology. The aim of this paper is to discuss not-widely-known ibn Tabataba contributions to cryptology in poet and his effort in this field.
Research Interests:
Research into phishing and social engineering is a very interesting area since a significant number of attacks are conducted with the help of social engineering and phishing as the main vector to either obtain credentials or trick the... more
Research into phishing and social engineering is a very interesting area since a significant number of attacks are conducted with the help of social engineering and phishing as the main vector to either obtain credentials or trick the user into executing a malware infected file. The goal of our research was to examine the students' familiarity with threats in the form of phishing attacks conducted via the Internet. A questionnaire was conducted to determine the students' ability to recognize phishing attacks and if they know how to protect themselves. The motivation behind this research is to explore the Saudian Student population's self assessment in regard to phishing attacks and to assess their capability on a limited data set for purpose of obtaining a baseline for future research.
Research Interests:
Information security is a great concern to computer users, which is not only a technical problem, but also related to human factors. One of the main issues in Kingdom of Saudi Arabia related to Internet banking is the weak security in... more
Information security is a great concern to computer users, which is not only a technical problem, but also related to human factors. One of the main issues in Kingdom of Saudi Arabia related to Internet banking is the weak security in Internet banking application. Therefore this study will investigate further the solution to enhance the security issues in Internet banking implementation. In today's high speed world, millions of transactions occur every minute. For these transactions, data need to be readily available for the genuine people who want to have access, and it must be kept securely from imposters. Information security is measured by the degree of the application of ISO 27001 and PCI-DSS standards on Saudian Banks, while banks' performance is measured by indicators of profitability and asset quality. This paper aims to comprehensively identify and assess the information security management for e-banks in Saudi Arabia with an attempt to fill the gap in the literature.
Research Interests:
The explosive entry of technology into everyday life have changed how people live, work, how companies do their daily business and how governments serve their people. With the help of IT, governments are realizing that, by applying the... more
The explosive entry of technology into everyday life have changed how people
live, work, how companies do their daily business and how governments serve their people.
With the help of IT, governments are realizing that, by applying the same principles and
technologies that are fueling e- business revolution, they can achieve similar transformation.
The result is the emergency of e-governments. This paper will focus on e-government in
Sudan. It will provide the general overview of e-government, its importance, types, stages
and challenges facing this country in managing e-government. Finally, the study
recommended that proper orientation should be given to E-Government adoption and
development in Sudan.
Research Interests:
Abstract The world we are in today is all about Information Technology (IT) because we are in the age of Information Technology and the people with the right information, with proper way of disseminate this information and processing them... more
Abstract
The world we are in today is all about Information Technology (IT) because we are in the age of Information
Technology and the people with the right information, with proper way of disseminate this information and processing them is
considered as the most successful. Computers have become the mainstay of business and government processes.
Business has been using them for years and in most countries, there are drives towards electronic or joined up government. This is to
allow the people to access government services from their desktop in their own home . A rapid growth of
computer crimes and formation of laws in different countries addresses the severity of problem. This paper
discusses the stand of Saudi Arabian government against cyber crime and its IT act. It analyzes the cybercrime
in the Kingdom and the anti-cyber crime law.
Research Interests:
Cryptography paved the way for the development of arguably humanity's greatest achievements yet, Computers, the Internet and the digital world. Throughout history the need for secrecy has been important. Governments and ordinary people... more
Cryptography paved the way for the development of arguably humanity's greatest achievements yet, Computers, the Internet and the digital world. Throughout history the need for secrecy has been important. Governments and ordinary people have increasingly sought to secure the delivery of certain messages and important information in a way that allows only the intended recipient access and comprehension. This need for secrecy brought about the invention and the art of concealment, coding and code making. In return, the need for intelligence and information lead to the development of code breaking techniques. These techniques primarily attack a particular weakness that a code or concealment method may have, rendering the sought after information apparent and comprehensible to the assailant. This paper presents Arab contributions in cryptography , it discuss Ibn Dunaynir cryptologist who was the first described an arithmetical cipher, in which cleartext characters are converted into numbers and then some simple arithmetic operations are performed on them.
Research Interests: