Any kind of malicious activity that attempts to achieve unauthorized access, collection, disabling, prevention, destroy or sabotage of the information system resources or the information itself
The interconnected network of IT infrastructure, including Internet, communications networks, computer systems and Internet-connected devices, as well as associated hardware and control devices. The term can also refer to a virtual world or domain such as a simple concept.
Intentional exploitation of computer systems, networks, and organizations whose work depends on digital ICT, in order to cause damage.
It is the function of defining and verifying access rights/privileges to resources related to organization’s information and technical assets security in general and to access control in particular. Maintaining authorized restrictions on access to and disclosure of information, including means of protecting privacy/personal information
Risks to organizational operations (Including vision, mission, functions, image or reputation), organizational assets, individuals, other organizations, or the nation due to the potential of unauthorized access, use, disclosure, disruption, modification, or destruction of information and/or information systems.
Intentional exploitation of computer systems, networks, and organizations whose work depends on digital ICT, in order to cause damage.
Anything tangible or intangible that has value to the organization. There are many types of assets, and some of which include obvious things, such as: persons, machineries, utilities, patents, software and services. The term could also include less obvious things, such as: information and characteristics (e.g., organization’s reputation and public image, as well as skill and knowledge).
In accordance with the Telecommunications and information technology Act, CST’s Bylaw and CST powers granted thereby, including those related to protecting public and users interests, maintaining ICT confidentiality, CST's role is to raise cybersecurity maturity in ICT sector in the Kingdom and boost service providers confidence in taking all necessary measures. Strengthening and regulating cybersecurity has become greatly important in order to increase confidence in safety of ICT services resilience, protect public and users interest, and to maintain ICT confidentiality in accordance with highest quality and security standards, as well as to raise overall sectoral cybersecurity maturity. CST has issued the Cybersecurity Regulatory Framework (CRF) for service providers in the ICT sector, which contains a comprehensive set of cybersecurity requirements and controls. CRF provides requirements for improving the management of cybersecurity risks through an approach consistent with best global practices and local cybersecurity frameworks, to promote cybersecurity best practices for ICT service providers. This will reflect on raising confidence in integrity of service providers’ infrastructure, in addition to supporting regulatory framework to adopt a risk management methodology to meet cybersecurity requirements, encourage service providers to adopt best practices to develop appropriate cybersecurity measures, raise service providers’ readiness against cyber-attacks, and to ensure confidentiality, safety and availability of services provided to their clients.
The ICT sector is a key pillar of economic growth, providing basic competitiveness of national economy through high-speed broadband, electronic services, and information assets. Given the increasing expectations for continued availability of services and transparency of user experience, as well as effectiveness of protecting critical systems and data, strengthening cybersecurity in the Kingdom has become extremely important to increase confidence of digital nation in safety and resilience of the ICT sector infrastructure and services.