In response to a more complex and dangerous landscape threat, Dubai became the first emirate in the UAE to adopt Internet Security Standards (ICS) standard. The change came in response to a decade-long online series involving different companies.

According to a representative of the Dubai Electronic Security Center (DESC), the new standards will lead to a safer and more secure country. For more information about this security update required for UAE industry, read on.

What is ICS?

Why not suddenly focus on industrial management? Well it’s not a coincidence now. The process of developing and implementing detailed responses to attacks on the malicious network takes a long time. And after a series of high -profile attacks that began in 2012 and continue to this day, the gentleman realized that it was only a matter of time before anything really happened. mistakes.

What exactly is ICS? The term management services is a broad term used to refer to the variety of systems, communications, controls and devices provided to operate and automate industrial operations.

In today’s world, ICS is an integral part of key components in almost every business, including transportation, water treatment, energy and many manufacturing facilities. Like other OPEC members, the health of the UAE and Dubai’s economy are in line with oil production. No wonder saboteurs value their efforts in this regard over the years. One large-scale attack will have damage damage.

Implementing Solutions

As ICS is not located in Dubai in the private sector, the latest version of the program is based at the revenue office in four countries, currently airports, government oil and gas. Government, electricity and water management and transport/transport authorities . But acceptance has been replaced and acceptance of the challenges of prayer statistics is inevitable. The day is not far off when these adoptions will face even more risks.

The fact is, it’s hard to go completely offline in this world. That’s why DESC has taken incentive steps to protect itself from customers at the door. New standards developed by examining existing requirements, such as ISO 27001 for general information for security standards, and payment requirements, such as PCI DSS, are increasingly being used to protect customer information in terms of fees and charges.

The first five security threats discussed in the new context are:

1. Scam: This trick method of getting into a website via fake emails, has become more and more clever nowadays. Today phishers use AI to replicate past breaches successfully and even generate unreliable voices to generate fraud on the phone. To put it bluntly, some business -class virtual private networks have begun to resist phishing attacks by automatically detecting it when you visit a malicious website – using AI.

2. Ransomware: Over the past year, ransomware has become very popular as flagships have visited schools, colleges, hospitals and even school buildings. This is a smart move, because these companies often pay the need to maintain public services. It is expected that the bad guys will continue this practice and possibly create stakes. Governments and federal governments, mind you warnings.

3. The IoT: The Internet of Things has brought a new level of communication to the world. The internet no longer just includes websites, but now you have to think about the millions (billions?) of smart devices that have been added to the mix and – oh, by the way – have created a plague of road safety problems.

4. Insider Threats: One of the most dangerous threats to any organization comes from the inside. Estimates say that one-third of all violations are the result of employee misconduct or direct misconduct.

5. AI Hack Algorithms: Developing intelligence doesn’t just mean the good guys are getting smarter. It also means that the bad guys have these algorithms that are learning to attack unguided networks.

 Follow and connect with us on FacebookLinkedIn & Twitter


Please enter your comment!
Please enter your name here